Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-0211
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Apache | Apache HTTP Server |
Version: 2.4.17 to 2.4.38 |
CISA Known exploited vulnerability
Data from the Known Exploited Vulnerabilities Catalog
Date added: 2021-11-03
Due date: 2022-05-03
Required action: Apply updates per vendor instructions.
Used in ransomware: Unknown
Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-0211
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T17:44:15.393Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "[oss-security] 20190401 CVE-2019-0211: Apache HTTP Server privilege escalation from modules' scripts", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2019/04/02/3", }, { name: "107666", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/107666", }, { name: "20190403 [SECURITY] [DSA 4422-1] apache2 security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Apr/5", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.synology.com/security/advisory/Synology_SA_19_14", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/152386/Apache-2.4.38-Root-Privilege-Escalation.html", }, { name: "USN-3937-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3937-1/", }, { name: "FEDORA-2019-cf7695b470", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/", }, { name: "DSA-4422", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2019/dsa-4422", }, { name: "[httpd-users] 20190406 [users@httpd] CVE-2019-0211/0215/0217", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/b1613d44ec364c87bb7ee8c5939949f9b061c05c06e0e90098ebf7aa%40%3Cusers.httpd.apache.org%3E", }, { name: "FEDORA-2019-119b14075a", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/", }, { name: "20190407 [slackware-security] httpd (SSA:2019-096-01)", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Apr/16", }, { name: "46676", tags: [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred", ], url: "https://www.exploit-db.com/exploits/46676/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://httpd.apache.org/security/vulnerabilities_24.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/152415/Slackware-Security-Advisory-httpd-Updates.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/152441/CARPE-DIEM-Apache-2.4.x-Local-Privilege-Escalation.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://www.apache.org/dist/httpd/CHANGES_2.4.39", }, { name: "[community-dev] 20190411 CVE-2019-0211 applicable to versions 2.2.x?", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/890507b85c30adf133216b299cc35cd8cd0346a885acfc671c04694e%40%3Cdev.community.apache.org%3E", }, { name: "[community-dev] 20190411 Re: CVE-2019-0211 applicable to versions 2.2.x?", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/b2bdb308dc015e771ba79c0586b2de6fb50caa98b109833f5d4daf28%40%3Cdev.community.apache.org%3E", }, { name: "RHSA-2019:0746", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2019:0746", }, { name: "openSUSE-SU-2019:1190", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00051.html", }, { name: "[community-dev] 20190411 RE: CVE-2019-0211 applicable to versions 2.2.x?", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/de881a130bc9cb2f3a9ff220784520556884fb8ea80e69400a45509e%40%3Cdev.community.apache.org%3E", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.f5.com/csp/article/K32957101", }, { name: "openSUSE-SU-2019:1209", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00061.html", }, { name: "GLSA-201904-20", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201904-20", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20190423-0001/", }, { name: "openSUSE-SU-2019:1258", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html", }, { name: "RHSA-2019:0980", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2019:0980", }, { name: "RHBA-2019:0959", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHBA-2019:0959", }, { name: "FEDORA-2019-a4ed7400f4", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/", }, { name: "RHSA-2019:1297", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2019:1297", }, { name: "RHSA-2019:1296", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2019:1296", }, { name: "[httpd-cvs] 20190611 svn commit: r1861068 - /httpd/site/trunk/content/security/vulnerabilities-httpd.xml", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/fd110f4ace2d8364c7d9190e1993cde92f79e4eb85576ed9285686ac%40%3Ccvs.httpd.apache.org%3E", }, { name: "RHSA-2019:1543", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2019:1543", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html", }, { name: "[oss-security] 20190726 Re: Statistics for distros lists updated for 2019Q2", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2019/07/26/7", }, { name: "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", }, { name: "[announce] 20200131 Apache Software Foundation Security Report: 2019", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E", }, { name: "[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.oracle.com/security-alerts/cpuapr2020.html", }, { name: "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073149 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E", }, ], title: "CVE Program Container", }, { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, }, { other: { content: { id: "CVE-2019-0211", options: [ { Exploitation: "active", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2025-02-06T21:03:33.852786Z", version: "2.0.3", }, type: "ssvc", }, }, { other: { content: { dateAdded: "2021-11-03", reference: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2019-0211", }, type: "kev", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-416", description: "CWE-416 Use After Free", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-02-06T21:04:27.062Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Apache HTTP Server", vendor: "Apache", versions: [ { status: "affected", version: "2.4.17 to 2.4.38", }, ], }, ], datePublic: "2019-04-01T00:00:00.000Z", descriptions: [ { lang: "en", value: "In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected.", }, ], problemTypes: [ { descriptions: [ { description: "Apache HTTP Server privilege escalation from modules' scripts", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-06-06T10:11:34.000Z", orgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09", shortName: "apache", }, references: [ { name: "[oss-security] 20190401 CVE-2019-0211: Apache HTTP Server privilege escalation from modules' scripts", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2019/04/02/3", }, { name: "107666", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/107666", }, { name: "20190403 [SECURITY] [DSA 4422-1] apache2 security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Apr/5", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.synology.com/security/advisory/Synology_SA_19_14", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/152386/Apache-2.4.38-Root-Privilege-Escalation.html", }, { name: "USN-3937-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3937-1/", }, { name: "FEDORA-2019-cf7695b470", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/", }, { name: "DSA-4422", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2019/dsa-4422", }, { name: "[httpd-users] 20190406 [users@httpd] CVE-2019-0211/0215/0217", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/b1613d44ec364c87bb7ee8c5939949f9b061c05c06e0e90098ebf7aa%40%3Cusers.httpd.apache.org%3E", }, { name: "FEDORA-2019-119b14075a", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/", }, { name: "20190407 [slackware-security] httpd (SSA:2019-096-01)", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Apr/16", }, { name: "46676", tags: [ "exploit", "x_refsource_EXPLOIT-DB", ], url: "https://www.exploit-db.com/exploits/46676/", }, { tags: [ "x_refsource_MISC", ], url: "https://httpd.apache.org/security/vulnerabilities_24.html", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/152415/Slackware-Security-Advisory-httpd-Updates.html", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/152441/CARPE-DIEM-Apache-2.4.x-Local-Privilege-Escalation.html", }, { tags: [ "x_refsource_MISC", ], url: "http://www.apache.org/dist/httpd/CHANGES_2.4.39", }, { name: "[community-dev] 20190411 CVE-2019-0211 applicable to versions 2.2.x?", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/890507b85c30adf133216b299cc35cd8cd0346a885acfc671c04694e%40%3Cdev.community.apache.org%3E", }, { name: "[community-dev] 20190411 Re: CVE-2019-0211 applicable to versions 2.2.x?", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/b2bdb308dc015e771ba79c0586b2de6fb50caa98b109833f5d4daf28%40%3Cdev.community.apache.org%3E", }, { name: "RHSA-2019:0746", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2019:0746", }, { name: "openSUSE-SU-2019:1190", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00051.html", }, { name: "[community-dev] 20190411 RE: CVE-2019-0211 applicable to versions 2.2.x?", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/de881a130bc9cb2f3a9ff220784520556884fb8ea80e69400a45509e%40%3Cdev.community.apache.org%3E", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.f5.com/csp/article/K32957101", }, { name: "openSUSE-SU-2019:1209", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00061.html", }, { name: "GLSA-201904-20", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201904-20", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20190423-0001/", }, { name: "openSUSE-SU-2019:1258", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html", }, { name: "RHSA-2019:0980", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2019:0980", }, { name: "RHBA-2019:0959", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHBA-2019:0959", }, { name: "FEDORA-2019-a4ed7400f4", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/", }, { name: "RHSA-2019:1297", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2019:1297", }, { name: "RHSA-2019:1296", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2019:1296", }, { name: "[httpd-cvs] 20190611 svn commit: r1861068 - /httpd/site/trunk/content/security/vulnerabilities-httpd.xml", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/fd110f4ace2d8364c7d9190e1993cde92f79e4eb85576ed9285686ac%40%3Ccvs.httpd.apache.org%3E", }, { name: "RHSA-2019:1543", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2019:1543", }, { tags: [ "x_refsource_MISC", ], url: "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html", }, { name: "[oss-security] 20190726 Re: Statistics for distros lists updated for 2019Q2", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2019/07/26/7", }, { name: "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us", }, { tags: [ "x_refsource_MISC", ], url: "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", }, { name: "[announce] 20200131 Apache Software Foundation Security Report: 2019", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E", }, { name: "[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E", }, { tags: [ "x_refsource_MISC", ], url: "https://www.oracle.com/security-alerts/cpuapr2020.html", }, { name: "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073149 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@apache.org", ID: "CVE-2019-0211", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Apache HTTP Server", version: { version_data: [ { version_value: "2.4.17 to 2.4.38", }, ], }, }, ], }, vendor_name: "Apache", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Apache HTTP Server privilege escalation from modules' scripts", }, ], }, ], }, references: { reference_data: [ { name: "[oss-security] 20190401 CVE-2019-0211: Apache HTTP Server privilege escalation from modules' scripts", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2019/04/02/3", }, { name: "107666", refsource: "BID", url: "http://www.securityfocus.com/bid/107666", }, { name: "20190403 [SECURITY] [DSA 4422-1] apache2 security update", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Apr/5", }, { name: "https://www.synology.com/security/advisory/Synology_SA_19_14", refsource: "CONFIRM", url: "https://www.synology.com/security/advisory/Synology_SA_19_14", }, { name: "http://packetstormsecurity.com/files/152386/Apache-2.4.38-Root-Privilege-Escalation.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/152386/Apache-2.4.38-Root-Privilege-Escalation.html", }, { name: "USN-3937-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3937-1/", }, { name: "FEDORA-2019-cf7695b470", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/", }, { name: "DSA-4422", refsource: "DEBIAN", url: "https://www.debian.org/security/2019/dsa-4422", }, { name: "[httpd-users] 20190406 [users@httpd] CVE-2019-0211/0215/0217", refsource: "MLIST", url: "https://lists.apache.org/thread.html/b1613d44ec364c87bb7ee8c5939949f9b061c05c06e0e90098ebf7aa@%3Cusers.httpd.apache.org%3E", }, { name: "FEDORA-2019-119b14075a", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/", }, { name: "20190407 [slackware-security] httpd (SSA:2019-096-01)", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Apr/16", }, { name: "46676", refsource: "EXPLOIT-DB", url: "https://www.exploit-db.com/exploits/46676/", }, { name: "https://httpd.apache.org/security/vulnerabilities_24.html", refsource: "MISC", url: "https://httpd.apache.org/security/vulnerabilities_24.html", }, { name: "http://packetstormsecurity.com/files/152415/Slackware-Security-Advisory-httpd-Updates.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/152415/Slackware-Security-Advisory-httpd-Updates.html", }, { name: "http://packetstormsecurity.com/files/152441/CARPE-DIEM-Apache-2.4.x-Local-Privilege-Escalation.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/152441/CARPE-DIEM-Apache-2.4.x-Local-Privilege-Escalation.html", }, { name: "http://www.apache.org/dist/httpd/CHANGES_2.4.39", refsource: "MISC", url: "http://www.apache.org/dist/httpd/CHANGES_2.4.39", }, { name: "[community-dev] 20190411 CVE-2019-0211 applicable to versions 2.2.x?", refsource: "MLIST", url: "https://lists.apache.org/thread.html/890507b85c30adf133216b299cc35cd8cd0346a885acfc671c04694e@%3Cdev.community.apache.org%3E", }, { name: "[community-dev] 20190411 Re: CVE-2019-0211 applicable to versions 2.2.x?", refsource: "MLIST", url: "https://lists.apache.org/thread.html/b2bdb308dc015e771ba79c0586b2de6fb50caa98b109833f5d4daf28@%3Cdev.community.apache.org%3E", }, { name: "RHSA-2019:0746", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2019:0746", }, { name: "openSUSE-SU-2019:1190", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00051.html", }, { name: "[community-dev] 20190411 RE: CVE-2019-0211 applicable to versions 2.2.x?", refsource: "MLIST", url: "https://lists.apache.org/thread.html/de881a130bc9cb2f3a9ff220784520556884fb8ea80e69400a45509e@%3Cdev.community.apache.org%3E", }, { name: "https://support.f5.com/csp/article/K32957101", refsource: "CONFIRM", url: "https://support.f5.com/csp/article/K32957101", }, { name: "openSUSE-SU-2019:1209", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00061.html", }, { name: "GLSA-201904-20", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201904-20", }, { name: "https://security.netapp.com/advisory/ntap-20190423-0001/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20190423-0001/", }, { name: "openSUSE-SU-2019:1258", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html", }, { name: "RHSA-2019:0980", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2019:0980", }, { name: "RHBA-2019:0959", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHBA-2019:0959", }, { name: "FEDORA-2019-a4ed7400f4", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/", }, { name: "RHSA-2019:1297", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2019:1297", }, { name: "RHSA-2019:1296", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2019:1296", }, { name: "[httpd-cvs] 20190611 svn commit: r1861068 - /httpd/site/trunk/content/security/vulnerabilities-httpd.xml", refsource: "MLIST", url: "https://lists.apache.org/thread.html/fd110f4ace2d8364c7d9190e1993cde92f79e4eb85576ed9285686ac@%3Ccvs.httpd.apache.org%3E", }, { name: "RHSA-2019:1543", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2019:1543", }, { name: "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html", refsource: "MISC", url: "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html", }, { name: "[oss-security] 20190726 Re: Statistics for distros lists updated for 2019Q2", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2019/07/26/7", }, { name: "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", url: "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", url: "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E", }, { name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us", refsource: "CONFIRM", url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us", }, { name: "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", refsource: "MISC", url: "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", }, { name: "[announce] 20200131 Apache Software Foundation Security Report: 2019", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E", }, { name: "[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", url: "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", url: "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E", }, { name: "https://www.oracle.com/security-alerts/cpuapr2020.html", refsource: "MISC", url: "https://www.oracle.com/security-alerts/cpuapr2020.html", }, { name: "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", refsource: "MLIST", url: "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", url: "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/", refsource: "MLIST", url: "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073149 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", refsource: "MLIST", url: "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09", assignerShortName: "apache", cveId: "CVE-2019-0211", datePublished: "2019-04-08T21:31:09.000Z", dateReserved: "2018-11-14T00:00:00.000Z", dateUpdated: "2025-02-06T21:04:27.062Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { cisa_known_exploited: { cveID: "CVE-2019-0211", cwes: "[\"CWE-416\"]", dateAdded: "2021-11-03", dueDate: "2022-05-03", knownRansomwareCampaignUse: "Unknown", notes: "https://nvd.nist.gov/vuln/detail/CVE-2019-0211", product: "HTTP Server", requiredAction: "Apply updates per vendor instructions.", shortDescription: "Apache HTTP Server, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute code with the privileges of the parent process (usually root) by manipulating the scoreboard.", vendorProject: "Apache", vulnerabilityName: "Apache HTTP Server Privilege Escalation Vulnerability", }, nvd: "{\"cve\":{\"id\":\"CVE-2019-0211\",\"sourceIdentifier\":\"security@apache.org\",\"published\":\"2019-04-08T22:29:00.387\",\"lastModified\":\"2025-04-04T15:34:11.407\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected.\"},{\"lang\":\"es\",\"value\":\"En Apache HTTP Server 2.4, versiones 2.4.17 a 2.4.38, con el evento MPM, worker o prefork, el código ejecutándose en procesos hijo (o hilos) menos privilegiados (incluyendo scripts ejecutados por un intérprete de scripts en proceso) podría ejecutar código arbitrario con los privilegios del proceso padre (normalmente root) manipulando el marcador. Los sistemas que no son Unix no se ven afectados.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"cisaExploitAdd\":\"2021-11-03\",\"cisaActionDue\":\"2022-05-03\",\"cisaRequiredAction\":\"Apply updates per vendor instructions.\",\"cisaVulnerabilityName\":\"Apache HTTP Server Privilege Escalation Vulnerability\",\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.4.17\",\"versionEndIncluding\":\"2.4.38\",\"matchCriteriaId\":\"3AF858A9-701E-44F6-8DB1-36B76C40733A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC1BD7B7-6D88-42B8-878E-F1318CA5FCAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D100F7CE-FC64-4CC6-852A-6136D72DA419\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97A4B8DF-58DA-4AB6-A1F9-331B36409BA3\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"815D70A8-47D3-459C-A32C-9FEACA0659D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"B3293E55-5506-4587-A318-D1734F781C09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07C312A0-CD2C-4B9C-B064-6409B25C278F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1E78106-58E6-4D59-990F-75DA575BFAD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F65DAB0-3DAD-49FF-BC73-3581CC3D5BF3\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*\",\"matchCriteriaId\":\"3FA5E22C-489B-4C5F-A5F3-C03F45CA8811\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2466282-51AB-478D-9FF4-FA524265ED2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F87326E-0B56-4356-A889-73D026DB1D4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openshift_container_platform_for_power:3.11_ppc64le:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6005C278-5443-42EA-9D16-220FBF17FC95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D7EE4B6-A6EC-4B9B-91DF-79615796673F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CFF558-3C47-480D-A2F0-BABF26042943\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92BC9265-6959-4D37-BE5E-8C45E98992F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"831F0F47-3565-4763-B16F-C87B1FF2035E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E3F09B5-569F-4C58-9FCA-3C0953D107B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C3741B8-851F-475D-B428-523F4F722350\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62C31522-0A17-4025-B269-855C7F4B45C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.0_aarch64:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A47EF78-A5B6-4B89-8B74-EEB0647C549F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.1_aarch64:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FF1A19F-8A15-471A-B496-E1B4BA788356\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.2_aarch64:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAD7EC1D-5979-42E6-9DA6-355B53431F3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.4_aarch64:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE49DCA5-1B01-4478-A1E9-2E87E948A0C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.6_aarch64:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37B7CE5C-BFEA-4F96-9759-D511EF189059\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.8_aarch64:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"213593D4-EB5A-4A1B-BDF3-3F043C5F6A6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0_s390x:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32AF225E-94C0-4D07-900C-DD868C05F554\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.1_s390x:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00966AC5-1C84-4B5F-9665-5E99D4AEB3A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2_s390x:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D04F433-CB52-4F3D-8711-39D3BDA27FE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4_s390x:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07332196-7E36-4E95-81BC-DD959629C1BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.6_s390x:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B758EDC9-6421-422C-899E-A273D2936D8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.8_s390x:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22C65F53-D624-48A9-A9B7-4C78A31E19F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0_ppc64le:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23D471AC-7DCA-4425-AD91-E5D928753A8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.1_ppc64le:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F505D098-2143-4218-A528-D92BFC017FFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2_ppc64le:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96E5CEC7-D3B9-4895-96E9-E26D2ACF1AE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4_ppc64le:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB28CF82-799F-4A6E-B1DB-0AB423E6C05D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.6_ppc64le:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9C30C59-07F7-4CCE-B057-052ECCD36DB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.8_ppc64le:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F91F9255-4EE1-43C7-8831-D2B6C228BFD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6897676D-53F9-45B3-B27F-7FF9A4C58D33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E28F226A-CBC7-4A32-BE58-398FA5B42481\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76C24D94-834A-4E9D-8F73-624AFA99AAA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B09ACF2D-D83F-4A86-8185-9569605D8EE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC10D919-57FD-4725-B8D2-39ECB476902F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1272DF03-7674-4BD4-8E64-94004B195448\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1CA946D-1665-4874-9D41-C7D963DD1F56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3D1213C-EB9C-4475-9268-86AD947D256E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3ADDB02D-F377-43CE-B0A8-FC6C7D5CFABC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E881C927-DF96-4D2E-9887-FF12E456B1FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB096D5D-E8F6-4164-8B76-0217B7151D30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01ED4F33-EBE7-4C04-8312-3DA580EFFB68\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_session_report_manager:8.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DDF6809-53A7-4F7D-9FA8-B522BE8F7A21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_session_report_manager:8.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA86A15F-FAB8-4DF5-95AC-DA3D1CF7A720\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_session_report_manager:8.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB43DFD4-D058-4001-BD19-488E059F4532\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_session_report_manager:8.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"086E2E5C-44EB-4C07-B298-C04189533996\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_session_route_manager:8.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B042935-BC42-4CA8-9379-7F0F894F9653\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_session_route_manager:8.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B374F86-4EC8-4797-A8C3-5C1FF1DFC9F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_session_route_manager:8.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5682DAEB-3810-4541-833A-568C868BCE0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_session_route_manager:8.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01BC9AED-F81D-4344-AD97-EEF19B6EA8C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB654DFA-FEF9-4D00-ADB0-F3F2B6ACF13E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37209C6F-EF99-4D21-9608-B3A06D283D24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFC79B17-E9D2-44D5-93ED-2F959E7A3D43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82EA4BA7-C38B-4AF3-8914-9E3D089EBDD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9C9BC66-FA5F-4774-9BDA-7AB88E2839C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F69B9A5-F21B-4904-9F27-95C0F7A628E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:retail_xstore_point_of_service:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F87FC90-16D0-4051-8280-B0DD4441F10B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:retail_xstore_point_of_service:7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0ED83E3-E6BF-4EAA-AF8F-33485A88A218\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00051.html\",\"source\":\"security@apache.org\",\"tags\":[\"Broken Link\",\"Mailing List\",\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00061.html\",\"source\":\"security@apache.org\",\"tags\":[\"Broken Link\",\"Mailing List\",\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html\",\"source\":\"security@apache.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/152386/Apache-2.4.38-Root-Privilege-Escalation.html\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/152415/Slackware-Security-Advisory-httpd-Updates.html\",\"source\":\"security@apache.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/152441/CARPE-DIEM-Apache-2.4.x-Local-Privilege-Escalation.html\",\"source\":\"security@apache.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.apache.org/dist/httpd/CHANGES_2.4.39\",\"source\":\"security@apache.org\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2019/04/02/3\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2019/07/26/7\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://www.securityfocus.com/bid/107666\",\"source\":\"security@apache.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHBA-2019:0959\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:0746\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:0980\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:1296\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:1297\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:1543\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://httpd.apache.org/security/vulnerabilities_24.html\",\"source\":\"security@apache.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.apache.org/thread.html/890507b85c30adf133216b299cc35cd8cd0346a885acfc671c04694e%40%3Cdev.community.apache.org%3E\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.apache.org/thread.html/b1613d44ec364c87bb7ee8c5939949f9b061c05c06e0e90098ebf7aa%40%3Cusers.httpd.apache.org%3E\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.apache.org/thread.html/b2bdb308dc015e771ba79c0586b2de6fb50caa98b109833f5d4daf28%40%3Cdev.community.apache.org%3E\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.apache.org/thread.html/de881a130bc9cb2f3a9ff220784520556884fb8ea80e69400a45509e%40%3Cdev.community.apache.org%3E\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.apache.org/thread.html/fd110f4ace2d8364c7d9190e1993cde92f79e4eb85576ed9285686ac%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\",\"Patch\"]},{\"url\":\"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/\",\"source\":\"security@apache.org\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/\",\"source\":\"security@apache.org\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/\",\"source\":\"security@apache.org\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Apr/16\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Apr/5\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201904-20\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20190423-0001/\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K32957101\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3937-1/\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2019/dsa-4422\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/46676/\",\"source\":\"security@apache.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuapr2020.html\",\"source\":\"security@apache.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html\",\"source\":\"security@apache.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html\",\"source\":\"security@apache.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.synology.com/security/advisory/Synology_SA_19_14\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00051.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Mailing List\",\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00061.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Mailing List\",\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/152386/Apache-2.4.38-Root-Privilege-Escalation.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/152415/Slackware-Security-Advisory-httpd-Updates.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/152441/CARPE-DIEM-Apache-2.4.x-Local-Privilege-Escalation.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.apache.org/dist/httpd/CHANGES_2.4.39\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2019/04/02/3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2019/07/26/7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://www.securityfocus.com/bid/107666\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHBA-2019:0959\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:0746\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:0980\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:1296\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:1297\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:1543\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://httpd.apache.org/security/vulnerabilities_24.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.apache.org/thread.html/890507b85c30adf133216b299cc35cd8cd0346a885acfc671c04694e%40%3Cdev.community.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.apache.org/thread.html/b1613d44ec364c87bb7ee8c5939949f9b061c05c06e0e90098ebf7aa%40%3Cusers.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.apache.org/thread.html/b2bdb308dc015e771ba79c0586b2de6fb50caa98b109833f5d4daf28%40%3Cdev.community.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.apache.org/thread.html/de881a130bc9cb2f3a9ff220784520556884fb8ea80e69400a45509e%40%3Cdev.community.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.apache.org/thread.html/fd110f4ace2d8364c7d9190e1993cde92f79e4eb85576ed9285686ac%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\"]},{\"url\":\"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Apr/16\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Apr/5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201904-20\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20190423-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K32957101\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3937-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2019/dsa-4422\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/46676/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuapr2020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.synology.com/security/advisory/Synology_SA_19_14\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}", vulnrichment: { containers: "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://www.openwall.com/lists/oss-security/2019/04/02/3\", \"name\": \"[oss-security] 20190401 CVE-2019-0211: Apache HTTP Server privilege escalation from modules' scripts\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"http://www.securityfocus.com/bid/107666\", \"name\": \"107666\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\", \"x_transferred\"]}, {\"url\": \"https://seclists.org/bugtraq/2019/Apr/5\", \"name\": \"20190403 [SECURITY] [DSA 4422-1] apache2 security update\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\", \"x_transferred\"]}, {\"url\": \"https://www.synology.com/security/advisory/Synology_SA_19_14\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://packetstormsecurity.com/files/152386/Apache-2.4.38-Root-Privilege-Escalation.html\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://usn.ubuntu.com/3937-1/\", \"name\": \"USN-3937-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\", \"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/\", \"name\": \"FEDORA-2019-cf7695b470\", \"tags\": [\"vendor-advisory\", \"x_refsource_FEDORA\", \"x_transferred\"]}, {\"url\": \"https://www.debian.org/security/2019/dsa-4422\", \"name\": \"DSA-4422\", \"tags\": [\"vendor-advisory\", \"x_refsource_DEBIAN\", \"x_transferred\"]}, {\"url\": \"https://lists.apache.org/thread.html/b1613d44ec364c87bb7ee8c5939949f9b061c05c06e0e90098ebf7aa%40%3Cusers.httpd.apache.org%3E\", \"name\": \"[httpd-users] 20190406 [users@httpd] CVE-2019-0211/0215/0217\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/\", \"name\": \"FEDORA-2019-119b14075a\", \"tags\": [\"vendor-advisory\", \"x_refsource_FEDORA\", \"x_transferred\"]}, {\"url\": \"https://seclists.org/bugtraq/2019/Apr/16\", \"name\": \"20190407 [slackware-security] httpd (SSA:2019-096-01)\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\", \"x_transferred\"]}, {\"url\": \"https://www.exploit-db.com/exploits/46676/\", \"name\": \"46676\", \"tags\": [\"exploit\", \"x_refsource_EXPLOIT-DB\", \"x_transferred\"]}, {\"url\": \"https://httpd.apache.org/security/vulnerabilities_24.html\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"http://packetstormsecurity.com/files/152415/Slackware-Security-Advisory-httpd-Updates.html\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"http://packetstormsecurity.com/files/152441/CARPE-DIEM-Apache-2.4.x-Local-Privilege-Escalation.html\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"http://www.apache.org/dist/httpd/CHANGES_2.4.39\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://lists.apache.org/thread.html/890507b85c30adf133216b299cc35cd8cd0346a885acfc671c04694e%40%3Cdev.community.apache.org%3E\", \"name\": \"[community-dev] 20190411 CVE-2019-0211 applicable to versions 2.2.x?\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"https://lists.apache.org/thread.html/b2bdb308dc015e771ba79c0586b2de6fb50caa98b109833f5d4daf28%40%3Cdev.community.apache.org%3E\", \"name\": \"[community-dev] 20190411 Re: CVE-2019-0211 applicable to versions 2.2.x?\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:0746\", \"name\": \"RHSA-2019:0746\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00051.html\", \"name\": \"openSUSE-SU-2019:1190\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"]}, {\"url\": \"https://lists.apache.org/thread.html/de881a130bc9cb2f3a9ff220784520556884fb8ea80e69400a45509e%40%3Cdev.community.apache.org%3E\", \"name\": \"[community-dev] 20190411 RE: CVE-2019-0211 applicable to versions 2.2.x?\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"https://support.f5.com/csp/article/K32957101\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00061.html\", \"name\": \"openSUSE-SU-2019:1209\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"]}, {\"url\": \"https://security.gentoo.org/glsa/201904-20\", \"name\": \"GLSA-201904-20\", \"tags\": [\"vendor-advisory\", \"x_refsource_GENTOO\", \"x_transferred\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20190423-0001/\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html\", \"name\": \"openSUSE-SU-2019:1258\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:0980\", \"name\": \"RHSA-2019:0980\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHBA-2019:0959\", \"name\": \"RHBA-2019:0959\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/\", \"name\": \"FEDORA-2019-a4ed7400f4\", \"tags\": [\"vendor-advisory\", \"x_refsource_FEDORA\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:1297\", \"name\": \"RHSA-2019:1297\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:1296\", \"name\": \"RHSA-2019:1296\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://lists.apache.org/thread.html/fd110f4ace2d8364c7d9190e1993cde92f79e4eb85576ed9285686ac%40%3Ccvs.httpd.apache.org%3E\", \"name\": \"[httpd-cvs] 20190611 svn commit: r1861068 - /httpd/site/trunk/content/security/vulnerabilities-httpd.xml\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:1543\", \"name\": \"RHSA-2019:1543\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2019/07/26/7\", \"name\": \"[oss-security] 20190726 Re: Statistics for distros lists updated for 2019Q2\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E\", \"name\": \"[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E\", \"name\": \"[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E\", \"name\": \"[announce] 20200131 Apache Software Foundation Security Report: 2019\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E\", \"name\": \"[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E\", \"name\": \"[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"https://www.oracle.com/security-alerts/cpuapr2020.html\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E\", \"name\": \"[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E\", \"name\": \"[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E\", \"name\": \"[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E\", \"name\": \"[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E\", \"name\": \"[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E\", \"name\": \"[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E\", \"name\": \"[httpd-cvs] 20210330 svn commit: r1073149 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E\", \"name\": \"[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T17:44:15.393Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.8, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2019-0211\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"active\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-02-06T21:03:33.852786Z\"}}}, {\"other\": {\"type\": \"kev\", \"content\": {\"dateAdded\": \"2021-11-03\", \"reference\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2019-0211\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-416\", \"description\": \"CWE-416 Use After Free\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-02-06T21:03:23.734Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"Apache\", \"product\": \"Apache HTTP Server\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.4.17 to 2.4.38\"}]}], \"datePublic\": \"2019-04-01T00:00:00.000Z\", \"references\": [{\"url\": \"http://www.openwall.com/lists/oss-security/2019/04/02/3\", \"name\": \"[oss-security] 20190401 CVE-2019-0211: Apache HTTP Server privilege escalation from modules' scripts\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"http://www.securityfocus.com/bid/107666\", \"name\": \"107666\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\"]}, {\"url\": \"https://seclists.org/bugtraq/2019/Apr/5\", \"name\": \"20190403 [SECURITY] [DSA 4422-1] apache2 security update\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\"]}, {\"url\": \"https://www.synology.com/security/advisory/Synology_SA_19_14\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://packetstormsecurity.com/files/152386/Apache-2.4.38-Root-Privilege-Escalation.html\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://usn.ubuntu.com/3937-1/\", \"name\": \"USN-3937-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/\", \"name\": \"FEDORA-2019-cf7695b470\", \"tags\": [\"vendor-advisory\", \"x_refsource_FEDORA\"]}, {\"url\": \"https://www.debian.org/security/2019/dsa-4422\", \"name\": \"DSA-4422\", \"tags\": [\"vendor-advisory\", \"x_refsource_DEBIAN\"]}, {\"url\": \"https://lists.apache.org/thread.html/b1613d44ec364c87bb7ee8c5939949f9b061c05c06e0e90098ebf7aa%40%3Cusers.httpd.apache.org%3E\", \"name\": \"[httpd-users] 20190406 [users@httpd] CVE-2019-0211/0215/0217\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/\", \"name\": \"FEDORA-2019-119b14075a\", \"tags\": [\"vendor-advisory\", \"x_refsource_FEDORA\"]}, {\"url\": \"https://seclists.org/bugtraq/2019/Apr/16\", \"name\": \"20190407 [slackware-security] httpd (SSA:2019-096-01)\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\"]}, {\"url\": \"https://www.exploit-db.com/exploits/46676/\", \"name\": \"46676\", \"tags\": [\"exploit\", \"x_refsource_EXPLOIT-DB\"]}, {\"url\": \"https://httpd.apache.org/security/vulnerabilities_24.html\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"http://packetstormsecurity.com/files/152415/Slackware-Security-Advisory-httpd-Updates.html\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"http://packetstormsecurity.com/files/152441/CARPE-DIEM-Apache-2.4.x-Local-Privilege-Escalation.html\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"http://www.apache.org/dist/httpd/CHANGES_2.4.39\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://lists.apache.org/thread.html/890507b85c30adf133216b299cc35cd8cd0346a885acfc671c04694e%40%3Cdev.community.apache.org%3E\", \"name\": \"[community-dev] 20190411 CVE-2019-0211 applicable to versions 2.2.x?\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"https://lists.apache.org/thread.html/b2bdb308dc015e771ba79c0586b2de6fb50caa98b109833f5d4daf28%40%3Cdev.community.apache.org%3E\", \"name\": \"[community-dev] 20190411 Re: CVE-2019-0211 applicable to versions 2.2.x?\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:0746\", \"name\": \"RHSA-2019:0746\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00051.html\", \"name\": \"openSUSE-SU-2019:1190\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"]}, {\"url\": \"https://lists.apache.org/thread.html/de881a130bc9cb2f3a9ff220784520556884fb8ea80e69400a45509e%40%3Cdev.community.apache.org%3E\", \"name\": \"[community-dev] 20190411 RE: CVE-2019-0211 applicable to versions 2.2.x?\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"https://support.f5.com/csp/article/K32957101\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00061.html\", \"name\": \"openSUSE-SU-2019:1209\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"]}, {\"url\": \"https://security.gentoo.org/glsa/201904-20\", \"name\": \"GLSA-201904-20\", \"tags\": [\"vendor-advisory\", \"x_refsource_GENTOO\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20190423-0001/\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html\", \"name\": \"openSUSE-SU-2019:1258\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:0980\", \"name\": \"RHSA-2019:0980\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHBA-2019:0959\", \"name\": \"RHBA-2019:0959\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/\", \"name\": \"FEDORA-2019-a4ed7400f4\", \"tags\": [\"vendor-advisory\", \"x_refsource_FEDORA\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:1297\", \"name\": \"RHSA-2019:1297\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:1296\", \"name\": \"RHSA-2019:1296\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://lists.apache.org/thread.html/fd110f4ace2d8364c7d9190e1993cde92f79e4eb85576ed9285686ac%40%3Ccvs.httpd.apache.org%3E\", \"name\": \"[httpd-cvs] 20190611 svn commit: r1861068 - /httpd/site/trunk/content/security/vulnerabilities-httpd.xml\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:1543\", \"name\": \"RHSA-2019:1543\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2019/07/26/7\", \"name\": \"[oss-security] 20190726 Re: Statistics for distros lists updated for 2019Q2\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E\", \"name\": \"[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E\", \"name\": \"[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E\", \"name\": \"[announce] 20200131 Apache Software Foundation Security Report: 2019\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E\", \"name\": \"[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E\", \"name\": \"[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"https://www.oracle.com/security-alerts/cpuapr2020.html\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E\", \"name\": \"[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E\", \"name\": \"[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E\", \"name\": \"[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E\", \"name\": \"[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E\", \"name\": \"[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E\", \"name\": \"[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E\", \"name\": \"[httpd-cvs] 20210330 svn commit: r1073149 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E\", \"name\": \"[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"Apache HTTP Server privilege escalation from modules' scripts\"}]}], \"providerMetadata\": {\"orgId\": \"f0158376-9dc2-43b6-827c-5f631a4d8d09\", \"shortName\": \"apache\", \"dateUpdated\": \"2021-06-06T10:11:34.000Z\"}, \"x_legacyV4Record\": {\"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"2.4.17 to 2.4.38\"}]}, \"product_name\": \"Apache HTTP Server\"}]}, \"vendor_name\": \"Apache\"}]}}, \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"http://www.openwall.com/lists/oss-security/2019/04/02/3\", \"name\": \"[oss-security] 20190401 CVE-2019-0211: Apache HTTP Server privilege escalation from modules' scripts\", \"refsource\": \"MLIST\"}, {\"url\": \"http://www.securityfocus.com/bid/107666\", \"name\": \"107666\", \"refsource\": \"BID\"}, {\"url\": \"https://seclists.org/bugtraq/2019/Apr/5\", \"name\": \"20190403 [SECURITY] [DSA 4422-1] apache2 security update\", \"refsource\": \"BUGTRAQ\"}, {\"url\": \"https://www.synology.com/security/advisory/Synology_SA_19_14\", \"name\": \"https://www.synology.com/security/advisory/Synology_SA_19_14\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://packetstormsecurity.com/files/152386/Apache-2.4.38-Root-Privilege-Escalation.html\", \"name\": \"http://packetstormsecurity.com/files/152386/Apache-2.4.38-Root-Privilege-Escalation.html\", \"refsource\": \"MISC\"}, {\"url\": \"https://usn.ubuntu.com/3937-1/\", \"name\": \"USN-3937-1\", \"refsource\": \"UBUNTU\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/\", \"name\": \"FEDORA-2019-cf7695b470\", \"refsource\": \"FEDORA\"}, {\"url\": \"https://www.debian.org/security/2019/dsa-4422\", \"name\": \"DSA-4422\", \"refsource\": \"DEBIAN\"}, {\"url\": \"https://lists.apache.org/thread.html/b1613d44ec364c87bb7ee8c5939949f9b061c05c06e0e90098ebf7aa@%3Cusers.httpd.apache.org%3E\", \"name\": \"[httpd-users] 20190406 [users@httpd] CVE-2019-0211/0215/0217\", \"refsource\": \"MLIST\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/\", \"name\": \"FEDORA-2019-119b14075a\", \"refsource\": \"FEDORA\"}, {\"url\": \"https://seclists.org/bugtraq/2019/Apr/16\", \"name\": \"20190407 [slackware-security] httpd (SSA:2019-096-01)\", \"refsource\": \"BUGTRAQ\"}, {\"url\": \"https://www.exploit-db.com/exploits/46676/\", \"name\": \"46676\", \"refsource\": \"EXPLOIT-DB\"}, {\"url\": \"https://httpd.apache.org/security/vulnerabilities_24.html\", \"name\": \"https://httpd.apache.org/security/vulnerabilities_24.html\", \"refsource\": \"MISC\"}, {\"url\": \"http://packetstormsecurity.com/files/152415/Slackware-Security-Advisory-httpd-Updates.html\", \"name\": \"http://packetstormsecurity.com/files/152415/Slackware-Security-Advisory-httpd-Updates.html\", \"refsource\": \"MISC\"}, {\"url\": \"http://packetstormsecurity.com/files/152441/CARPE-DIEM-Apache-2.4.x-Local-Privilege-Escalation.html\", \"name\": \"http://packetstormsecurity.com/files/152441/CARPE-DIEM-Apache-2.4.x-Local-Privilege-Escalation.html\", \"refsource\": \"MISC\"}, {\"url\": \"http://www.apache.org/dist/httpd/CHANGES_2.4.39\", \"name\": \"http://www.apache.org/dist/httpd/CHANGES_2.4.39\", \"refsource\": \"MISC\"}, {\"url\": \"https://lists.apache.org/thread.html/890507b85c30adf133216b299cc35cd8cd0346a885acfc671c04694e@%3Cdev.community.apache.org%3E\", \"name\": \"[community-dev] 20190411 CVE-2019-0211 applicable to versions 2.2.x?\", \"refsource\": \"MLIST\"}, {\"url\": \"https://lists.apache.org/thread.html/b2bdb308dc015e771ba79c0586b2de6fb50caa98b109833f5d4daf28@%3Cdev.community.apache.org%3E\", \"name\": \"[community-dev] 20190411 Re: CVE-2019-0211 applicable to versions 2.2.x?\", \"refsource\": \"MLIST\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:0746\", \"name\": \"RHSA-2019:0746\", \"refsource\": \"REDHAT\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00051.html\", \"name\": \"openSUSE-SU-2019:1190\", \"refsource\": \"SUSE\"}, {\"url\": \"https://lists.apache.org/thread.html/de881a130bc9cb2f3a9ff220784520556884fb8ea80e69400a45509e@%3Cdev.community.apache.org%3E\", \"name\": \"[community-dev] 20190411 RE: CVE-2019-0211 applicable to versions 2.2.x?\", \"refsource\": \"MLIST\"}, {\"url\": \"https://support.f5.com/csp/article/K32957101\", \"name\": \"https://support.f5.com/csp/article/K32957101\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00061.html\", \"name\": \"openSUSE-SU-2019:1209\", \"refsource\": \"SUSE\"}, {\"url\": \"https://security.gentoo.org/glsa/201904-20\", \"name\": \"GLSA-201904-20\", \"refsource\": \"GENTOO\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20190423-0001/\", \"name\": \"https://security.netapp.com/advisory/ntap-20190423-0001/\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html\", \"name\": \"openSUSE-SU-2019:1258\", \"refsource\": \"SUSE\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:0980\", \"name\": \"RHSA-2019:0980\", \"refsource\": \"REDHAT\"}, {\"url\": \"https://access.redhat.com/errata/RHBA-2019:0959\", \"name\": \"RHBA-2019:0959\", \"refsource\": \"REDHAT\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/\", \"name\": \"FEDORA-2019-a4ed7400f4\", \"refsource\": \"FEDORA\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:1297\", \"name\": \"RHSA-2019:1297\", \"refsource\": \"REDHAT\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:1296\", \"name\": \"RHSA-2019:1296\", \"refsource\": \"REDHAT\"}, {\"url\": \"https://lists.apache.org/thread.html/fd110f4ace2d8364c7d9190e1993cde92f79e4eb85576ed9285686ac@%3Ccvs.httpd.apache.org%3E\", \"name\": \"[httpd-cvs] 20190611 svn commit: r1861068 - /httpd/site/trunk/content/security/vulnerabilities-httpd.xml\", \"refsource\": \"MLIST\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:1543\", \"name\": \"RHSA-2019:1543\", \"refsource\": \"REDHAT\"}, {\"url\": \"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html\", \"name\": \"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html\", \"refsource\": \"MISC\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2019/07/26/7\", \"name\": \"[oss-security] 20190726 Re: Statistics for distros lists updated for 2019Q2\", \"refsource\": \"MLIST\"}, {\"url\": \"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E\", \"name\": \"[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html\", \"refsource\": \"MLIST\"}, {\"url\": \"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E\", \"name\": \"[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html\", \"refsource\": \"MLIST\"}, {\"url\": \"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us\", \"name\": \"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html\", \"name\": \"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html\", \"refsource\": \"MISC\"}, {\"url\": \"https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E\", \"name\": \"[announce] 20200131 Apache Software Foundation Security Report: 2019\", \"refsource\": \"MLIST\"}, {\"url\": \"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E\", \"name\": \"[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html\", \"refsource\": \"MLIST\"}, {\"url\": \"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E\", \"name\": \"[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html\", \"refsource\": \"MLIST\"}, {\"url\": \"https://www.oracle.com/security-alerts/cpuapr2020.html\", \"name\": \"https://www.oracle.com/security-alerts/cpuapr2020.html\", \"refsource\": \"MISC\"}, {\"url\": \"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E\", \"name\": \"[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/\", \"refsource\": \"MLIST\"}, {\"url\": \"https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E\", \"name\": \"[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/\", \"refsource\": \"MLIST\"}, {\"url\": \"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E\", \"name\": \"[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html\", \"refsource\": \"MLIST\"}, {\"url\": \"https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E\", \"name\": \"[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/\", \"refsource\": \"MLIST\"}, {\"url\": \"https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E\", \"name\": \"[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/\", \"refsource\": \"MLIST\"}, {\"url\": \"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E\", \"name\": \"[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/\", \"refsource\": \"MLIST\"}, {\"url\": \"https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E\", \"name\": \"[httpd-cvs] 20210330 svn commit: r1073149 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/\", \"refsource\": \"MLIST\"}, {\"url\": \"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E\", \"name\": \"[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html\", \"refsource\": \"MLIST\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"Apache HTTP Server privilege escalation from modules' scripts\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2019-0211\", \"STATE\": \"PUBLIC\", \"ASSIGNER\": \"security@apache.org\"}}}}", cveMetadata: "{\"cveId\": \"CVE-2019-0211\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-02-06T21:04:27.062Z\", \"dateReserved\": \"2018-11-14T00:00:00.000Z\", \"assignerOrgId\": \"f0158376-9dc2-43b6-827c-5f631a4d8d09\", \"datePublished\": \"2019-04-08T21:31:09.000Z\", \"assignerShortName\": \"apache\"}", dataType: "CVE_RECORD", dataVersion: "5.1", }, }, }
RHSA-2019:1297
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update is now available for JBoss Core Services on RHEL 6 and RHEL 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.", title: "Topic", }, { category: "general", text: "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.\n\nThis release of Red Hat JBoss Core Services Apache HTTP Server 2.4.29 Service Pack 2 serves as an update to Red Hat JBoss Core Services Apache HTTP Server 2.4.29, and includes bug fixes for CVEs which are linked to in the References section.\n\nSecurity Fix(es):\n\n* openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang (CVE-2018-0732)\n\n* openssl: ROHNP - Key Extraction Side Channel in Multiple Crypto Libraries (CVE-2018-0495)\n\n* httpd: privilege escalation from modules scripts (CVE-2019-0211)\n\nDetails around this issue, including information about the CVE, severity of the issue, and CVSS scores can be found on the CVE pages listed in the References section below.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2019:1297", url: "https://access.redhat.com/errata/RHSA-2019:1297", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "1591100", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1591100", }, { category: "external", summary: "1591163", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1591163", }, { category: "external", summary: "1694980", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1694980", }, { category: "external", summary: "JBCS-620", url: "https://issues.redhat.com/browse/JBCS-620", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1297.json", }, ], title: "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 SP2 security update", tracking: { current_release_date: "2024-11-22T12:07:43+00:00", generator: { date: "2024-11-22T12:07:43+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2019:1297", initial_release_date: "2019-05-30T14:57:48+00:00", revision_history: [ { date: "2019-05-30T14:57:48+00:00", number: "1", summary: "Initial version", }, { date: "2019-05-30T14:57:48+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T12:07:43+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat JBoss Core Services on RHEL 7 Server", product: { name: "Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS", product_identification_helper: { cpe: "cpe:/a:redhat:jboss_core_services:1::el7", }, }, }, { category: "product_name", name: "Red Hat JBoss Core Services on RHEL 6 Server", product: { name: "Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS", product_identification_helper: { cpe: "cpe:/a:redhat:jboss_core_services:1::el6", }, }, }, ], category: "product_family", name: "Red Hat JBoss Core Services", }, { branches: [ { category: "product_version", name: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64", product: { name: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64", product_id: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2n-15.jbcs.el7?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64", product: { name: "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64", product_id: "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2n-15.jbcs.el7?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64", product: { name: "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64", product_id: "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2n-15.jbcs.el7?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64", product: { name: "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64", product_id: "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2n-15.jbcs.el7?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64", product: { name: "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64", product_id: "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2n-15.jbcs.el7?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64", product: { name: "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64", product_id: "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2n-15.jbcs.el7?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64", product: { name: "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64", product_id: "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.29-40.jbcs.el7?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64", product: { name: "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64", product_id: "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.29-40.jbcs.el7?arch=x86_64", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64", product: { name: "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64", product_id: "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.29-40.jbcs.el7?arch=x86_64", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64", product: { name: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64", product_id: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.29-40.jbcs.el7?arch=x86_64", }, }, }, { category: "product_version", name: "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64", product: { name: "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64", product_id: "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.29-40.jbcs.el7?arch=x86_64", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64", product: { name: "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64", product_id: "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.29-40.jbcs.el7?arch=x86_64", }, }, }, { category: "product_version", name: "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64", product: { name: "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64", product_id: "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.29-40.jbcs.el7?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64", product: { name: "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64", product_id: "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.29-40.jbcs.el7?arch=x86_64", }, }, }, { category: "product_version", name: "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64", product: { name: "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64", product_id: "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.29-40.jbcs.el7?arch=x86_64", }, }, }, { category: "product_version", name: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64", product: { name: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64", product_id: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2n-15.jbcs.el6?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64", product: { name: "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64", product_id: "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2n-15.jbcs.el6?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64", product: { name: "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64", product_id: "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2n-15.jbcs.el6?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64", product: { name: "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64", product_id: "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2n-15.jbcs.el6?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64", product: { name: "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64", product_id: "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2n-15.jbcs.el6?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64", product: { name: "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64", product_id: "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2n-15.jbcs.el6?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64", product: { name: "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64", product_id: "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.29-40.jbcs.el6?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64", product: { name: "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64", product_id: "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.29-40.jbcs.el6?arch=x86_64", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64", product: { name: "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64", product_id: "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.29-40.jbcs.el6?arch=x86_64", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64", product: { name: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64", product_id: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.29-40.jbcs.el6?arch=x86_64", }, }, }, { category: "product_version", name: "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64", product: { name: "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64", product_id: "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.29-40.jbcs.el6?arch=x86_64", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64", product: { name: "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64", product_id: "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.29-40.jbcs.el6?arch=x86_64", }, }, }, { category: "product_version", name: "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64", product: { name: "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64", product_id: "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.29-40.jbcs.el6?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64", product: { name: "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64", product_id: "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.29-40.jbcs.el6?arch=x86_64", }, }, }, { category: "product_version", name: "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64", product: { name: "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64", product_id: "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.29-40.jbcs.el6?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src", product: { name: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src", product_id: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2n-15.jbcs.el7?arch=src&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src", product: { name: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src", product_id: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.29-40.jbcs.el7?arch=src", }, }, }, { category: "product_version", name: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src", product: { name: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src", product_id: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2n-15.jbcs.el6?arch=src&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src", product: { name: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src", product_id: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.29-40.jbcs.el6?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch", product: { name: "jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch", product_id: "jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.29-40.jbcs.el7?arch=noarch", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch", product: { name: "jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch", product_id: "jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.29-40.jbcs.el6?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686", product: { name: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686", product_id: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2n-15.jbcs.el6?arch=i686&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686", product: { name: "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686", product_id: "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2n-15.jbcs.el6?arch=i686&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686", product: { name: "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686", product_id: "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2n-15.jbcs.el6?arch=i686&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686", product: { name: "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686", product_id: "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2n-15.jbcs.el6?arch=i686&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686", product: { name: "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686", product_id: "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2n-15.jbcs.el6?arch=i686&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686", product: { name: "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686", product_id: "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2n-15.jbcs.el6?arch=i686&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686", product: { name: "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686", product_id: "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.29-40.jbcs.el6?arch=i686&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686", product: { name: "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686", product_id: "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.29-40.jbcs.el6?arch=i686", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686", product: { name: "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686", product_id: "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.29-40.jbcs.el6?arch=i686", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686", product: { name: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686", product_id: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.29-40.jbcs.el6?arch=i686", }, }, }, { category: "product_version", name: "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686", product: { name: "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686", product_id: "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.29-40.jbcs.el6?arch=i686", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686", product: { name: "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686", product_id: "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.29-40.jbcs.el6?arch=i686", }, }, }, { category: "product_version", name: "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686", product: { name: "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686", product_id: "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.29-40.jbcs.el6?arch=i686&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686", product: { name: "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686", product_id: "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.29-40.jbcs.el6?arch=i686", }, }, }, { category: "product_version", name: "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686", product: { name: "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686", product_id: "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.29-40.jbcs.el6?arch=i686", }, }, }, ], category: "architecture", name: "i686", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686", }, product_reference: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src", }, product_reference: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64", }, product_reference: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686", }, product_reference: "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64", }, product_reference: "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686", }, product_reference: "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64", }, product_reference: "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch", }, product_reference: "jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686", }, product_reference: "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64", }, product_reference: "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686", }, product_reference: "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64", }, product_reference: "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686", }, product_reference: "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64", }, product_reference: "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686", }, product_reference: "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64", }, product_reference: "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686", }, product_reference: "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64", }, product_reference: "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686", }, product_reference: "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64", }, product_reference: "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686", }, product_reference: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src", }, product_reference: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64", }, product_reference: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686", }, product_reference: "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64", }, product_reference: "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686", }, product_reference: "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64", }, product_reference: "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686", }, product_reference: "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64", }, product_reference: "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686", }, product_reference: "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64", }, product_reference: "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686", }, product_reference: "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64", }, product_reference: "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src", }, product_reference: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src", relates_to_product_reference: "7Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64", }, product_reference: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64", relates_to_product_reference: "7Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64", }, product_reference: "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64", relates_to_product_reference: "7Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64", }, product_reference: "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64", relates_to_product_reference: "7Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch", }, product_reference: "jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch", relates_to_product_reference: "7Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64", }, product_reference: "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64", relates_to_product_reference: "7Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64", }, product_reference: "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64", relates_to_product_reference: "7Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64", }, product_reference: "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64", relates_to_product_reference: "7Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64", }, product_reference: "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64", relates_to_product_reference: "7Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64", }, product_reference: "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64", relates_to_product_reference: "7Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64", }, product_reference: "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64", relates_to_product_reference: "7Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src", }, product_reference: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src", relates_to_product_reference: "7Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64", }, product_reference: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64", relates_to_product_reference: "7Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64", }, product_reference: "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64", relates_to_product_reference: "7Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64", }, product_reference: "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64", relates_to_product_reference: "7Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64", }, product_reference: "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64", relates_to_product_reference: "7Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64", }, product_reference: "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64", relates_to_product_reference: "7Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64", }, product_reference: "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64", relates_to_product_reference: "7Server-JBCS", }, ], }, vulnerabilities: [ { cve: "CVE-2018-0495", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2018-06-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1591163", }, ], notes: [ { category: "description", text: "Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.", title: "Vulnerability description", }, { category: "summary", text: "ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries", title: "Vulnerability summary", }, { category: "other", text: "Since the 5.8.3 release, Red Hat CloudForms no longer uses libtomcrypt.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-0495", }, { category: "external", summary: "RHBZ#1591163", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1591163", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-0495", url: "https://www.cve.org/CVERecord?id=CVE-2018-0495", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-0495", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-0495", }, { category: "external", summary: "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/", url: "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/", }, ], release_date: "2018-06-13T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-05-30T14:57:48+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1297", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.1, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries", }, { cve: "CVE-2018-0732", cwe: { id: "CWE-325", name: "Missing Cryptographic Step", }, discovery_date: "2018-06-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1591100", }, ], notes: [ { category: "description", text: "During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).", title: "Vulnerability description", }, { category: "summary", text: "openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-0732", }, { category: "external", summary: "RHBZ#1591100", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1591100", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-0732", url: "https://www.cve.org/CVERecord?id=CVE-2018-0732", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-0732", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-0732", }, { category: "external", summary: "https://www.openssl.org/news/secadv/20180612.txt", url: "https://www.openssl.org/news/secadv/20180612.txt", }, ], release_date: "2018-06-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-05-30T14:57:48+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1297", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang", }, { cve: "CVE-2019-0211", cwe: { id: "CWE-250", name: "Execution with Unnecessary Privileges", }, discovery_date: "2019-04-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1694980", }, ], notes: [ { category: "description", text: "A flaw was found in Apache where code executing in a less-privileged child process or thread could execute arbitrary code with the privilege of the parent process (usually root). An attacker having access to run arbitrary scripts on the web server (PHP, CGI etc) could use this flaw to run code on the web server with root privileges.", title: "Vulnerability description", }, { category: "summary", text: "httpd: privilege escalation from modules scripts", title: "Vulnerability summary", }, { category: "other", text: "This flaw is exploitable in httpd if it is configured to allow an untrusted user to upload and execute arbitrary scripts. Due to the nature of the flaw, the uploaded script would not run as a restricted privileged user, but rather it runs as root allowing for privilege escalation from the restricted user to root on the web server. \n\nDepending on the configuration of the server, you would need local (AV:L) privileges to place the script or network (AV:N) privileges if the server ran an application that permitted uploading scripts directly. The latter scenario is not common for unauthenticated users. Once the attacker can place the script somewhere in the web root where it can be easily exploited (AC:L). This type of setup is more common in shared hosted environments (PR:L) and would allow an attacker with access to a site on the shared hosted to impact the confidentiality, integrity, and availability (CIA:H) with no interaction (UI:N). Due to the elevated privileges obtained, there is an impact to the system beyond the web server itself (S:C).", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-0211", }, { category: "external", summary: "RHBZ#1694980", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1694980", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-0211", url: "https://www.cve.org/CVERecord?id=CVE-2019-0211", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-0211", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-0211", }, { category: "external", summary: "http://www.apache.org/dist/httpd/CHANGES_2.4", url: "http://www.apache.org/dist/httpd/CHANGES_2.4", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211", }, { category: "external", summary: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", url: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, ], release_date: "2019-04-01T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-05-30T14:57:48+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1297", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64", ], }, ], threats: [ { category: "exploit_status", date: "2021-11-03T00:00:00+00:00", details: "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, { category: "impact", details: "Important", }, ], title: "httpd: privilege escalation from modules scripts", }, ], }
rhsa-2019:1297
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update is now available for JBoss Core Services on RHEL 6 and RHEL 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.", title: "Topic", }, { category: "general", text: "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.\n\nThis release of Red Hat JBoss Core Services Apache HTTP Server 2.4.29 Service Pack 2 serves as an update to Red Hat JBoss Core Services Apache HTTP Server 2.4.29, and includes bug fixes for CVEs which are linked to in the References section.\n\nSecurity Fix(es):\n\n* openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang (CVE-2018-0732)\n\n* openssl: ROHNP - Key Extraction Side Channel in Multiple Crypto Libraries (CVE-2018-0495)\n\n* httpd: privilege escalation from modules scripts (CVE-2019-0211)\n\nDetails around this issue, including information about the CVE, severity of the issue, and CVSS scores can be found on the CVE pages listed in the References section below.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2019:1297", url: "https://access.redhat.com/errata/RHSA-2019:1297", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "1591100", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1591100", }, { category: "external", summary: "1591163", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1591163", }, { category: "external", summary: "1694980", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1694980", }, { category: "external", summary: "JBCS-620", url: "https://issues.redhat.com/browse/JBCS-620", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1297.json", }, ], title: "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 SP2 security update", tracking: { current_release_date: "2024-11-22T12:07:43+00:00", generator: { date: "2024-11-22T12:07:43+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2019:1297", initial_release_date: "2019-05-30T14:57:48+00:00", revision_history: [ { date: "2019-05-30T14:57:48+00:00", number: "1", summary: "Initial version", }, { date: "2019-05-30T14:57:48+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T12:07:43+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat JBoss Core Services on RHEL 7 Server", product: { name: "Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS", product_identification_helper: { cpe: "cpe:/a:redhat:jboss_core_services:1::el7", }, }, }, { category: "product_name", name: "Red Hat JBoss Core Services on RHEL 6 Server", product: { name: "Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS", product_identification_helper: { cpe: "cpe:/a:redhat:jboss_core_services:1::el6", }, }, }, ], category: "product_family", name: "Red Hat JBoss Core Services", }, { branches: [ { category: "product_version", name: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64", product: { name: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64", product_id: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2n-15.jbcs.el7?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64", product: { name: "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64", product_id: "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2n-15.jbcs.el7?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64", product: { name: "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64", product_id: "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2n-15.jbcs.el7?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64", product: { name: "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64", product_id: "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2n-15.jbcs.el7?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64", product: { name: "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64", product_id: "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2n-15.jbcs.el7?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64", product: { name: "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64", product_id: "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2n-15.jbcs.el7?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64", product: { name: "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64", product_id: "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.29-40.jbcs.el7?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64", product: { name: "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64", product_id: "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.29-40.jbcs.el7?arch=x86_64", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64", product: { name: "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64", product_id: "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.29-40.jbcs.el7?arch=x86_64", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64", product: { name: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64", product_id: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.29-40.jbcs.el7?arch=x86_64", }, }, }, { category: "product_version", name: "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64", product: { name: "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64", product_id: "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.29-40.jbcs.el7?arch=x86_64", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64", product: { name: "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64", product_id: "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.29-40.jbcs.el7?arch=x86_64", }, }, }, { category: "product_version", name: "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64", product: { name: "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64", product_id: "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.29-40.jbcs.el7?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64", product: { name: "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64", product_id: "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.29-40.jbcs.el7?arch=x86_64", }, }, }, { category: "product_version", name: "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64", product: { name: "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64", product_id: "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.29-40.jbcs.el7?arch=x86_64", }, }, }, { category: "product_version", name: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64", product: { name: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64", product_id: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2n-15.jbcs.el6?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64", product: { name: "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64", product_id: "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2n-15.jbcs.el6?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64", product: { name: "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64", product_id: "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2n-15.jbcs.el6?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64", product: { name: "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64", product_id: "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2n-15.jbcs.el6?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64", product: { name: "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64", product_id: "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2n-15.jbcs.el6?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64", product: { name: "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64", product_id: "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2n-15.jbcs.el6?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64", product: { name: "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64", product_id: "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.29-40.jbcs.el6?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64", product: { name: "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64", product_id: "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.29-40.jbcs.el6?arch=x86_64", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64", product: { name: "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64", product_id: "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.29-40.jbcs.el6?arch=x86_64", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64", product: { name: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64", product_id: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.29-40.jbcs.el6?arch=x86_64", }, }, }, { category: "product_version", name: "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64", product: { name: "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64", product_id: "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.29-40.jbcs.el6?arch=x86_64", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64", product: { name: "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64", product_id: "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.29-40.jbcs.el6?arch=x86_64", }, }, }, { category: "product_version", name: "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64", product: { name: "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64", product_id: "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.29-40.jbcs.el6?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64", product: { name: "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64", product_id: "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.29-40.jbcs.el6?arch=x86_64", }, }, }, { category: "product_version", name: "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64", product: { name: "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64", product_id: "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.29-40.jbcs.el6?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src", product: { name: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src", product_id: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2n-15.jbcs.el7?arch=src&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src", product: { name: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src", product_id: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.29-40.jbcs.el7?arch=src", }, }, }, { category: "product_version", name: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src", product: { name: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src", product_id: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2n-15.jbcs.el6?arch=src&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src", product: { name: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src", product_id: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.29-40.jbcs.el6?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch", product: { name: "jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch", product_id: "jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.29-40.jbcs.el7?arch=noarch", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch", product: { name: "jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch", product_id: "jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.29-40.jbcs.el6?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686", product: { name: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686", product_id: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2n-15.jbcs.el6?arch=i686&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686", product: { name: "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686", product_id: "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2n-15.jbcs.el6?arch=i686&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686", product: { name: "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686", product_id: "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2n-15.jbcs.el6?arch=i686&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686", product: { name: "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686", product_id: "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2n-15.jbcs.el6?arch=i686&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686", product: { name: "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686", product_id: "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2n-15.jbcs.el6?arch=i686&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686", product: { name: "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686", product_id: "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2n-15.jbcs.el6?arch=i686&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686", product: { name: "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686", product_id: "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.29-40.jbcs.el6?arch=i686&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686", product: { name: "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686", product_id: "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.29-40.jbcs.el6?arch=i686", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686", product: { name: "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686", product_id: "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.29-40.jbcs.el6?arch=i686", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686", product: { name: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686", product_id: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.29-40.jbcs.el6?arch=i686", }, }, }, { category: "product_version", name: "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686", product: { name: "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686", product_id: "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.29-40.jbcs.el6?arch=i686", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686", product: { name: "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686", product_id: "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.29-40.jbcs.el6?arch=i686", }, }, }, { category: "product_version", name: "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686", product: { name: "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686", product_id: "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.29-40.jbcs.el6?arch=i686&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686", product: { name: "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686", product_id: "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.29-40.jbcs.el6?arch=i686", }, }, }, { category: "product_version", name: "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686", product: { name: "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686", product_id: "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.29-40.jbcs.el6?arch=i686", }, }, }, ], category: "architecture", name: "i686", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686", }, product_reference: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src", }, product_reference: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64", }, product_reference: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686", }, product_reference: "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64", }, product_reference: "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686", }, product_reference: "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64", }, product_reference: "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch", }, product_reference: "jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686", }, product_reference: "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64", }, product_reference: "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686", }, product_reference: "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64", }, product_reference: "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686", }, product_reference: "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64", }, product_reference: "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686", }, product_reference: "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64", }, product_reference: "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686", }, product_reference: "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64", }, product_reference: "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686", }, product_reference: "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64", }, product_reference: "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686", }, product_reference: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src", }, product_reference: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64", }, product_reference: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686", }, product_reference: "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64", }, product_reference: "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686", }, product_reference: "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64", }, product_reference: "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686", }, product_reference: "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64", }, product_reference: "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686", }, product_reference: "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64", }, product_reference: "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686", }, product_reference: "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64", }, product_reference: "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src", }, product_reference: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src", relates_to_product_reference: "7Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64", }, product_reference: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64", relates_to_product_reference: "7Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64", }, product_reference: "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64", relates_to_product_reference: "7Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64", }, product_reference: "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64", relates_to_product_reference: "7Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch", }, product_reference: "jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch", relates_to_product_reference: "7Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64", }, product_reference: "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64", relates_to_product_reference: "7Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64", }, product_reference: "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64", relates_to_product_reference: "7Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64", }, product_reference: "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64", relates_to_product_reference: "7Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64", }, product_reference: "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64", relates_to_product_reference: "7Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64", }, product_reference: "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64", relates_to_product_reference: "7Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64", }, product_reference: "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64", relates_to_product_reference: "7Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src", }, product_reference: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src", relates_to_product_reference: "7Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64", }, product_reference: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64", relates_to_product_reference: "7Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64", }, product_reference: "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64", relates_to_product_reference: "7Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64", }, product_reference: "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64", relates_to_product_reference: "7Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64", }, product_reference: "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64", relates_to_product_reference: "7Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64", }, product_reference: "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64", relates_to_product_reference: "7Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64", }, product_reference: "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64", relates_to_product_reference: "7Server-JBCS", }, ], }, vulnerabilities: [ { cve: "CVE-2018-0495", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2018-06-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1591163", }, ], notes: [ { category: "description", text: "Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.", title: "Vulnerability description", }, { category: "summary", text: "ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries", title: "Vulnerability summary", }, { category: "other", text: "Since the 5.8.3 release, Red Hat CloudForms no longer uses libtomcrypt.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-0495", }, { category: "external", summary: "RHBZ#1591163", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1591163", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-0495", url: "https://www.cve.org/CVERecord?id=CVE-2018-0495", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-0495", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-0495", }, { category: "external", summary: "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/", url: "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/", }, ], release_date: "2018-06-13T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-05-30T14:57:48+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1297", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.1, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries", }, { cve: "CVE-2018-0732", cwe: { id: "CWE-325", name: "Missing Cryptographic Step", }, discovery_date: "2018-06-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1591100", }, ], notes: [ { category: "description", text: "During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).", title: "Vulnerability description", }, { category: "summary", text: "openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-0732", }, { category: "external", summary: "RHBZ#1591100", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1591100", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-0732", url: "https://www.cve.org/CVERecord?id=CVE-2018-0732", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-0732", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-0732", }, { category: "external", summary: "https://www.openssl.org/news/secadv/20180612.txt", url: "https://www.openssl.org/news/secadv/20180612.txt", }, ], release_date: "2018-06-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-05-30T14:57:48+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1297", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang", }, { cve: "CVE-2019-0211", cwe: { id: "CWE-250", name: "Execution with Unnecessary Privileges", }, discovery_date: "2019-04-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1694980", }, ], notes: [ { category: "description", text: "A flaw was found in Apache where code executing in a less-privileged child process or thread could execute arbitrary code with the privilege of the parent process (usually root). An attacker having access to run arbitrary scripts on the web server (PHP, CGI etc) could use this flaw to run code on the web server with root privileges.", title: "Vulnerability description", }, { category: "summary", text: "httpd: privilege escalation from modules scripts", title: "Vulnerability summary", }, { category: "other", text: "This flaw is exploitable in httpd if it is configured to allow an untrusted user to upload and execute arbitrary scripts. Due to the nature of the flaw, the uploaded script would not run as a restricted privileged user, but rather it runs as root allowing for privilege escalation from the restricted user to root on the web server. \n\nDepending on the configuration of the server, you would need local (AV:L) privileges to place the script or network (AV:N) privileges if the server ran an application that permitted uploading scripts directly. The latter scenario is not common for unauthenticated users. Once the attacker can place the script somewhere in the web root where it can be easily exploited (AC:L). This type of setup is more common in shared hosted environments (PR:L) and would allow an attacker with access to a site on the shared hosted to impact the confidentiality, integrity, and availability (CIA:H) with no interaction (UI:N). Due to the elevated privileges obtained, there is an impact to the system beyond the web server itself (S:C).", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-0211", }, { category: "external", summary: "RHBZ#1694980", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1694980", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-0211", url: "https://www.cve.org/CVERecord?id=CVE-2019-0211", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-0211", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-0211", }, { category: "external", summary: "http://www.apache.org/dist/httpd/CHANGES_2.4", url: "http://www.apache.org/dist/httpd/CHANGES_2.4", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211", }, { category: "external", summary: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", url: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, ], release_date: "2019-04-01T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-05-30T14:57:48+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1297", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64", ], }, ], threats: [ { category: "exploit_status", date: "2021-11-03T00:00:00+00:00", details: "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, { category: "impact", details: "Important", }, ], title: "httpd: privilege escalation from modules scripts", }, ], }
rhsa-2019:0980
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: privilege escalation from modules scripts (CVE-2019-0211)\n\n* httpd: mod_ssl: access control bypass when using per-location client certification authentication (CVE-2019-0215)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2019:0980", url: "https://access.redhat.com/errata/RHSA-2019:0980", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "1694980", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1694980", }, { category: "external", summary: "1695025", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1695025", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_0980.json", }, ], title: "Red Hat Security Advisory: httpd:2.4 security update", tracking: { current_release_date: "2024-11-22T12:56:59+00:00", generator: { date: "2024-11-22T12:56:59+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2019:0980", initial_release_date: "2019-05-07T04:19:52+00:00", revision_history: [ { date: "2019-05-07T04:19:52+00:00", number: "1", summary: "Initial version", }, { date: "2019-05-07T04:19:52+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T12:56:59+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AppStream (v. 8)", product: { name: "Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z", product_identification_helper: { cpe: "cpe:/a:redhat:enterprise_linux:8::appstream", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "httpd:2.4:8000020190405071959:55190bc5", product: { name: "httpd:2.4:8000020190405071959:55190bc5", product_id: "httpd:2.4:8000020190405071959:55190bc5", product_identification_helper: { purl: "pkg:rpmmod/redhat/httpd@2.4:8000020190405071959:55190bc5", }, }, }, { category: "product_version", name: "httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", product: { name: "httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", product_id: "httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-filesystem@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=noarch", }, }, }, { category: "product_version", name: "httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", product: { name: "httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", product_id: "httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-manual@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product: { name: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_id: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x", }, }, }, { category: "product_version", name: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product: { name: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_id: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x", }, }, }, { category: "product_version", name: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product: { name: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_id: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debugsource@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x", }, }, }, { category: "product_version", name: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product: { name: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_id: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-devel@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x", }, }, }, { category: "product_version", name: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product: { name: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_id: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x", }, }, }, { category: "product_version", name: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product: { name: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_id: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x", }, }, }, { category: "product_version", name: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", product: { name: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", product_id: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x", }, }, }, { category: "product_version", name: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", product: { name: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", product_id: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x", }, }, }, { category: "product_version", name: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", product: { name: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", product_id: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x", }, }, }, { category: "product_version", name: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product: { name: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_id: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x", }, }, }, { category: "product_version", name: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product: { name: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_id: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x", }, }, }, { category: "product_version", name: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product: { name: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_id: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x", }, }, }, { category: "product_version", name: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product: { name: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_id: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x", }, }, }, { category: "product_version", name: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product: { name: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_id: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product: { name: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_id: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product: { name: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_id: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x", }, }, }, { category: "product_version", name: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product: { name: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_id: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x", }, }, }, { category: "product_version", name: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product: { name: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_id: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product: { name: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_id: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x&epoch=1", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", product: { name: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", product_id: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", product_identification_helper: { purl: "pkg:rpm/redhat/httpd@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=src", }, }, }, { category: "product_version", name: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", product: { name: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", product_id: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product: { name: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_id: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64", }, }, }, { category: "product_version", name: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product: { name: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_id: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64", }, }, }, { category: "product_version", name: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product: { name: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_id: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debugsource@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64", }, }, }, { category: "product_version", name: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product: { name: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_id: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-devel@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64", }, }, }, { category: "product_version", name: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product: { name: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_id: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64", }, }, }, { category: "product_version", name: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product: { name: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_id: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64", }, }, }, { category: "product_version", name: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", product: { name: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", product_id: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64", }, }, }, { category: "product_version", name: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", product: { name: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", product_id: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64", }, }, }, { category: "product_version", name: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", product: { name: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", product_id: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64", }, }, }, { category: "product_version", name: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product: { name: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_id: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64", }, }, }, { category: "product_version", name: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product: { name: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_id: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64", }, }, }, { category: "product_version", name: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product: { name: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_id: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64", }, }, }, { category: "product_version", name: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product: { name: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_id: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64", }, }, }, { category: "product_version", name: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product: { name: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_id: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product: { name: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_id: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product: { name: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_id: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64", }, }, }, { category: "product_version", name: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product: { name: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_id: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64", }, }, }, { category: "product_version", name: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product: { name: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_id: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product: { name: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_id: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64&epoch=1", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product: { name: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_id: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product: { name: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_id: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product: { name: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_id: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debugsource@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product: { name: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_id: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-devel@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product: { name: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_id: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product: { name: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_id: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", product: { name: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", product_id: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", product: { name: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", product_id: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", product: { name: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", product_id: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product: { name: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_id: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product: { name: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_id: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product: { name: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_id: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product: { name: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_id: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product: { name: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_id: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product: { name: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_id: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product: { name: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_id: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product: { name: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_id: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product: { name: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_id: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product: { name: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_id: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le&epoch=1", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product: { name: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_id: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64", }, }, }, { category: "product_version", name: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product: { name: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_id: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64", }, }, }, { category: "product_version", name: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product: { name: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_id: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debugsource@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64", }, }, }, { category: "product_version", name: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product: { name: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_id: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-devel@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64", }, }, }, { category: "product_version", name: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product: { name: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_id: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64", }, }, }, { category: "product_version", name: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product: { name: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_id: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64", }, }, }, { category: "product_version", name: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", product: { name: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", product_id: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64", }, }, }, { category: "product_version", name: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", product: { name: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", product_id: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64", }, }, }, { category: "product_version", name: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", product: { name: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", product_id: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64", }, }, }, { category: "product_version", name: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product: { name: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_id: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64", }, }, }, { category: "product_version", name: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product: { name: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_id: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64", }, }, }, { category: "product_version", name: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product: { name: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_id: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64", }, }, }, { category: "product_version", name: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product: { name: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_id: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64", }, }, }, { category: "product_version", name: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product: { name: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_id: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product: { name: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_id: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product: { name: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_id: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64", }, }, }, { category: "product_version", name: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product: { name: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_id: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64", }, }, }, { category: "product_version", name: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product: { name: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_id: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product: { name: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_id: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64&epoch=1", }, }, }, ], category: "architecture", name: "x86_64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, product_reference: "httpd:2.4:8000020190405071959:55190bc5", relates_to_product_reference: "AppStream-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", }, product_reference: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", }, product_reference: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", }, product_reference: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", }, product_reference: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", }, product_reference: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", }, product_reference: "httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", }, product_reference: "httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", }, product_reference: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", }, product_reference: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", }, product_reference: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", }, product_reference: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", }, product_reference: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", }, product_reference: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", }, product_reference: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", }, product_reference: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", }, product_reference: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", }, product_reference: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", }, product_reference: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", }, product_reference: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", }, product_reference: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", }, product_reference: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", }, product_reference: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", }, product_reference: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, ], }, vulnerabilities: [ { cve: "CVE-2019-0211", cwe: { id: "CWE-250", name: "Execution with Unnecessary Privileges", }, discovery_date: "2019-04-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1694980", }, ], notes: [ { category: "description", text: "A flaw was found in Apache where code executing in a less-privileged child process or thread could execute arbitrary code with the privilege of the parent process (usually root). An attacker having access to run arbitrary scripts on the web server (PHP, CGI etc) could use this flaw to run code on the web server with root privileges.", title: "Vulnerability description", }, { category: "summary", text: "httpd: privilege escalation from modules scripts", title: "Vulnerability summary", }, { category: "other", text: "This flaw is exploitable in httpd if it is configured to allow an untrusted user to upload and execute arbitrary scripts. Due to the nature of the flaw, the uploaded script would not run as a restricted privileged user, but rather it runs as root allowing for privilege escalation from the restricted user to root on the web server. \n\nDepending on the configuration of the server, you would need local (AV:L) privileges to place the script or network (AV:N) privileges if the server ran an application that permitted uploading scripts directly. The latter scenario is not common for unauthenticated users. Once the attacker can place the script somewhere in the web root where it can be easily exploited (AC:L). This type of setup is more common in shared hosted environments (PR:L) and would allow an attacker with access to a site on the shared hosted to impact the confidentiality, integrity, and availability (CIA:H) with no interaction (UI:N). Due to the elevated privileges obtained, there is an impact to the system beyond the web server itself (S:C).", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-0211", }, { category: "external", summary: "RHBZ#1694980", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1694980", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-0211", url: "https://www.cve.org/CVERecord?id=CVE-2019-0211", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-0211", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-0211", }, { category: "external", summary: "http://www.apache.org/dist/httpd/CHANGES_2.4", url: "http://www.apache.org/dist/httpd/CHANGES_2.4", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211", }, { category: "external", summary: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", url: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, ], release_date: "2019-04-01T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-05-07T04:19:52+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:0980", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", ], }, ], threats: [ { category: "exploit_status", date: "2021-11-03T00:00:00+00:00", details: "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, { category: "impact", details: "Important", }, ], title: "httpd: privilege escalation from modules scripts", }, { cve: "CVE-2019-0215", cwe: { id: "CWE-284", name: "Improper Access Control", }, discovery_date: "2019-04-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1695025", }, ], notes: [ { category: "description", text: "A flaw was found in Apache HTTP Server 2.4 (releases 2.4.37 and 2.4.38). A bug in mod_ssl, when using per-location client certificate verification with TLSv1.3, allowed a client supporting Post-Handshake Authentication to bypass configured access control restrictions. An attacker could perform various unauthorized actions after bypassing the restrictions. The highest threat from this vulnerability is to data confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_ssl: access control bypass when using per-location client certification authentication", title: "Vulnerability summary", }, { category: "other", text: "This flaw can be exploited for httpd configurations where per-location client certificates are enabled and TLS 1.3 is used. \n\nThe attacker can remotely exploit this httpd flaw (AV:N). However the server had to be configured to use per-location client certificate and the attacker needs to have access to the authenticating client certificate (AC:H). No other significant privileges are required by the attacker (PR:L). The result of the attack is bypass of the configured access control restrictions (CI:H). This however does not affect the system beyond the web server itself (S:U).", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-0215", }, { category: "external", summary: "RHBZ#1695025", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1695025", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-0215", url: "https://www.cve.org/CVERecord?id=CVE-2019-0215", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-0215", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-0215", }, { category: "external", summary: "http://www.apache.org/dist/httpd/CHANGES_2.4", url: "http://www.apache.org/dist/httpd/CHANGES_2.4", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html", url: "https://httpd.apache.org/security/vulnerabilities_24.html", }, ], release_date: "2019-04-01T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-05-07T04:19:52+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:0980", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.8, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", version: "3.0", }, products: [ "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "httpd: mod_ssl: access control bypass when using per-location client certification authentication", }, ], }
rhsa-2019_1543
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Red Hat JBoss Core Services Pack Apache Server 2.4.29 Service Pack 2 packages for Microsoft Windows and Oracle Solaris are now available.\n\nRed Hat Product Security has rated this release as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "This release adds the new Apache HTTP Server 2.4.29 Service Pack 2 packages that are part of the JBoss Core Services offering.\n\nThis release serves as a replacement for Red Hat JBoss Core Services\nApache HTTP Server 2.4.29 SP1, and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes, enhancements and component upgrades included in this release.\n\nSecurity Fix(es):\n\n* openssl: ROHNP - Key Extraction Side Channel in Multiple Crypto Libraries (CVE-2018-0495)\n\n* openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang (CVE-2018-0732)\n\n* libxml2: NULL pointer dereference in xpath.c:xmlXPathCompOpEval() can allow attackers to cause a denial of service (CVE-2018-14404)\n\n* curl: Out-of-bounds read in code handling HTTP/2 trailers (CVE-2018-1000005)\n\n* curl: HTTP authentication leak in redirects (CVE-2018-1000007)\n\n* curl: FTP path trickery leads to NIL byte out of bounds write (CVE-2018-1000120)\n\n* curl: RTSP RTP buffer over-read (CVE-2018-1000122)\n\n* httpd: privilege escalation from modules scripts (CVE-2019-0211)\n\nDetails around these issues, including information about CVEs, severity of the issues, and CVSS scores can be found on the CVE pages listed in the References section below.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2019:1543", url: "https://access.redhat.com/errata/RHSA-2019:1543", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp&downloadType=securityPatches&version=2.4.29", url: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp&downloadType=securityPatches&version=2.4.29", }, { category: "external", summary: "1536013", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1536013", }, { category: "external", summary: "1537125", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1537125", }, { category: "external", summary: "1552628", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1552628", }, { category: "external", summary: "1553398", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1553398", }, { category: "external", summary: "1591100", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1591100", }, { category: "external", summary: "1591163", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1591163", }, { category: "external", summary: "1595985", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1595985", }, { category: "external", summary: "1694980", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1694980", }, { category: "external", summary: "JBCS-722", url: "https://issues.redhat.com/browse/JBCS-722", }, { category: "external", summary: "JBCS-750", url: "https://issues.redhat.com/browse/JBCS-750", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1543.json", }, ], title: "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 SP2 security update", tracking: { current_release_date: "2024-11-22T13:00:03+00:00", generator: { date: "2024-11-22T13:00:03+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2019:1543", initial_release_date: "2019-06-18T19:08:49+00:00", revision_history: [ { date: "2019-06-18T19:08:49+00:00", number: "1", summary: "Initial version", }, { date: "2019-06-18T19:08:49+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T13:00:03+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "JBoss Core Services Apache HTTP Server 2.4.29 SP2", product: { name: "JBoss Core Services Apache HTTP Server 2.4.29 SP2", product_id: "JBoss Core Services Apache HTTP Server 2.4.29 SP2", product_identification_helper: { cpe: "cpe:/a:redhat:jboss_core_services:1", }, }, }, ], category: "product_family", name: "Red Hat JBoss Core Services", }, ], category: "vendor", name: "Red Hat", }, ], }, vulnerabilities: [ { cve: "CVE-2018-0495", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2018-06-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1591163", }, ], notes: [ { category: "description", text: "Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.", title: "Vulnerability description", }, { category: "summary", text: "ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries", title: "Vulnerability summary", }, { category: "other", text: "Since the 5.8.3 release, Red Hat CloudForms no longer uses libtomcrypt.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-0495", }, { category: "external", summary: "RHBZ#1591163", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1591163", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-0495", url: "https://www.cve.org/CVERecord?id=CVE-2018-0495", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-0495", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-0495", }, { category: "external", summary: "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/", url: "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/", }, ], release_date: "2018-06-13T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.1, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries", }, { cve: "CVE-2018-0732", cwe: { id: "CWE-325", name: "Missing Cryptographic Step", }, discovery_date: "2018-06-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1591100", }, ], notes: [ { category: "description", text: "During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).", title: "Vulnerability description", }, { category: "summary", text: "openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-0732", }, { category: "external", summary: "RHBZ#1591100", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1591100", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-0732", url: "https://www.cve.org/CVERecord?id=CVE-2018-0732", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-0732", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-0732", }, { category: "external", summary: "https://www.openssl.org/news/secadv/20180612.txt", url: "https://www.openssl.org/news/secadv/20180612.txt", }, ], release_date: "2018-06-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang", }, { cve: "CVE-2018-14404", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, discovery_date: "2018-06-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1595985", }, ], notes: [ { category: "description", text: "A null pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 when parsing invalid XPath expression. Applications processing untrusted XSL format inputs with the use of libxml2 library may be vulnerable to denial of service attack due to crash of the application.", title: "Vulnerability description", }, { category: "summary", text: "libxml2: NULL pointer dereference in xmlXPathCompOpEval() function in xpath.c", title: "Vulnerability summary", }, { category: "other", text: "This issue affects the versions of libxml2 as shipped with Red Hat Enterprise Linux 5. Red Hat Enterprise Linux 5 is now in Extended Life Phase of the support and maintenance life cycle. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of libxml2 as shipped with Red Hat Enterprise Linux 6. Red Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Moderate, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of libxml2 as shipped with Red Hat Enterprise Linux 7. Red Hat Product Security has rated this issue as having a security impact of Moderate. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-14404", }, { category: "external", summary: "RHBZ#1595985", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1595985", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-14404", url: "https://www.cve.org/CVERecord?id=CVE-2018-14404", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-14404", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-14404", }, ], release_date: "2018-06-18T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "libxml2: NULL pointer dereference in xmlXPathCompOpEval() function in xpath.c", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "Harry Sintonen", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-16839", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2018-10-22T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1642201", }, ], notes: [ { category: "description", text: "Curl versions 7.33.0 through 7.61.1 are vulnerable to a buffer overrun in the SASL authentication code that may lead to denial of service.", title: "Vulnerability description", }, { category: "summary", text: "curl: Integer overflow leading to heap-based buffer overflow in Curl_sasl_create_plain_message()", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-16839", }, { category: "external", summary: "RHBZ#1642201", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1642201", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-16839", url: "https://www.cve.org/CVERecord?id=CVE-2018-16839", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-16839", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-16839", }, { category: "external", summary: "https://curl.haxx.se/docs/CVE-2018-16839.html", url: "https://curl.haxx.se/docs/CVE-2018-16839.html", }, ], release_date: "2018-10-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "curl: Integer overflow leading to heap-based buffer overflow in Curl_sasl_create_plain_message()", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "Brian Carpenter", ], organization: "Geeknik Labs", summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-16840", cwe: { id: "CWE-416", name: "Use After Free", }, discovery_date: "2018-10-22T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1642203", }, ], notes: [ { category: "description", text: "A heap use-after-free flaw was found in curl versions from 7.59.0 through 7.61.1 in the code related to closing an easy handle. When closing and cleaning up an 'easy' handle in the `Curl_close()` function, the library code first frees a struct (without nulling the pointer) and might then subsequently erroneously write to a struct field within that already freed struct.", title: "Vulnerability description", }, { category: "summary", text: "curl: Use-after-free when closing \"easy\" handle in Curl_close()", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-16840", }, { category: "external", summary: "RHBZ#1642203", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1642203", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-16840", url: "https://www.cve.org/CVERecord?id=CVE-2018-16840", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-16840", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-16840", }, { category: "external", summary: "https://curl.haxx.se/docs/CVE-2018-16840.html", url: "https://curl.haxx.se/docs/CVE-2018-16840.html", }, ], release_date: "2018-10-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "curl: Use-after-free when closing \"easy\" handle in Curl_close()", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "Brian Carpenter", ], organization: "Geeknik Labs", summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-16842", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, discovery_date: "2018-10-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1644124", }, ], notes: [ { category: "description", text: "Curl versions 7.14.1 through 7.61.1 are vulnerable to a heap-based buffer over-read in the tool_msgs.c:voutf() function that may result in information exposure and denial of service.", title: "Vulnerability description", }, { category: "summary", text: "curl: Heap-based buffer over-read in the curl tool warning formatting", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-16842", }, { category: "external", summary: "RHBZ#1644124", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1644124", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-16842", url: "https://www.cve.org/CVERecord?id=CVE-2018-16842", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-16842", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-16842", }, { category: "external", summary: "https://curl.haxx.se/docs/CVE-2018-16842.html", url: "https://curl.haxx.se/docs/CVE-2018-16842.html", }, ], release_date: "2018-10-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 3.6, baseSeverity: "LOW", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "curl: Heap-based buffer over-read in the curl tool warning formatting", }, { acknowledgments: [ { names: [ "Daniel Stenberg", ], organization: "the Curl project", }, { names: [ "Wenxiang Qian", ], organization: "Tencent Blade Team", summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-16890", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, discovery_date: "2019-01-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1670252", }, ], notes: [ { category: "description", text: "An out-of-bounds read flaw was found in the way curl handled NTLMv2 type-2 headers. When connecting to a remote malicious server which uses NTLM authentication, the flaw could cause curl to crash.", title: "Vulnerability description", }, { category: "summary", text: "curl: NTLM type-2 heap out-of-bounds buffer read", title: "Vulnerability summary", }, { category: "other", text: "The versions of curl package shipped with Red Hat Enterprise Linux 5, 6, and 7 do not support NTLMv2 type-2 headers, hence they are not affected by this flaw.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-16890", }, { category: "external", summary: "RHBZ#1670252", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1670252", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-16890", url: "https://www.cve.org/CVERecord?id=CVE-2018-16890", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-16890", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-16890", }, { category: "external", summary: "https://curl.haxx.se/docs/CVE-2018-16890.html", url: "https://curl.haxx.se/docs/CVE-2018-16890.html", }, ], release_date: "2019-02-06T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, { category: "workaround", details: "Turn off NTLM authentication.", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "curl: NTLM type-2 heap out-of-bounds buffer read", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "Zhouyihai Ding", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-1000005", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, discovery_date: "2018-01-17T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1536013", }, ], notes: [ { category: "description", text: "libcurl 7.49.0 to and including 7.57.0 contains an out bounds read in code handling HTTP/2 trailers. It was reported (https://github.com/curl/curl/pull/2231) that reading an HTTP/2 trailer could mess up future trailers since the stored size was one byte less than required. The problem is that the code that creates HTTP/1-like headers from the HTTP/2 trailer data once appended a string like `:` to the target buffer, while this was recently changed to `: ` (a space was added after the colon) but the following math wasn't updated correspondingly. When accessed, the data is read out of bounds and causes either a crash or that the (too large) data gets passed to client write. This could lead to a denial-of-service situation or an information disclosure if someone has a service that echoes back or uses the trailers for something.", title: "Vulnerability description", }, { category: "summary", text: "curl: Out-of-bounds read in code handling HTTP/2 trailers", title: "Vulnerability summary", }, { category: "other", text: "This flaw was introduced in curl-7.49.0. Therefore the versions of curl shipped with Red Hat Enterprise Linux 5, 6 and 7 and Red Hat Ceph Storage 2 are not affected by this flaw.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1000005", }, { category: "external", summary: "RHBZ#1536013", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1536013", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1000005", url: "https://www.cve.org/CVERecord?id=CVE-2018-1000005", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000005", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000005", }, { category: "external", summary: "https://curl.haxx.se/docs/adv_2018-824a.html", url: "https://curl.haxx.se/docs/adv_2018-824a.html", }, ], release_date: "2018-01-24T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "curl: Out-of-bounds read in code handling HTTP/2 trailers", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "Craig de Stigter", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-1000007", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2018-01-19T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1537125", }, ], notes: [ { category: "description", text: "It was found that curl and libcurl might send their Authentication header to a third party HTTP server upon receiving an HTTP REDIRECT reply. This could leak authentication token to external entities.", title: "Vulnerability description", }, { category: "summary", text: "curl: HTTP authentication leak in redirects", title: "Vulnerability summary", }, { category: "other", text: "This issue affects the versions of curl as shipped with Red Hat Enterprise Linux 5, 6, and 7, as well as the versions of httpd24-curl as shipped with Red Hat Software Collections. Red Hat Product Security has rated this issue as having Moderate security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1000007", }, { category: "external", summary: "RHBZ#1537125", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1537125", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1000007", url: "https://www.cve.org/CVERecord?id=CVE-2018-1000007", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000007", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000007", }, { category: "external", summary: "https://curl.haxx.se/docs/adv_2018-b3bf.html", url: "https://curl.haxx.se/docs/adv_2018-b3bf.html", }, ], release_date: "2018-01-24T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, { category: "workaround", details: "By default, curl and libcurl will not follow redirect requests.\nThis flaw happens only when curl or libcurl are explicitly requested to follow redirects (option --location in curl, and CURLOPT_FOLLOWLOCATION in libcurl).\nTo mitigate this, it is possible to prevent the automated following of redirects, replacing it by manual redirects (and remove the authentication header), for example.", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "curl: HTTP authentication leak in redirects", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "Duy Phan Thanh", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-1000120", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2018-03-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1552628", }, ], notes: [ { category: "description", text: "It was found that libcurl did not safely parse FTP URLs when using the CURLOPT_FTP_FILEMETHOD method. An attacker, able to provide a specially crafted FTP URL to an application using libcurl, could write a NULL byte at an arbitrary location, resulting in a crash or an unspecified behavior.", title: "Vulnerability description", }, { category: "summary", text: "curl: FTP path trickery leads to NIL byte out of bounds write", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1000120", }, { category: "external", summary: "RHBZ#1552628", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1552628", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1000120", url: "https://www.cve.org/CVERecord?id=CVE-2018-1000120", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000120", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000120", }, { category: "external", summary: "https://curl.haxx.se/docs/adv_2018-9cd6.html", url: "https://curl.haxx.se/docs/adv_2018-9cd6.html", }, ], release_date: "2018-03-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, { category: "workaround", details: "Preventing application from using non-default CURLOPT_FTP_FILEMETHOD will avoid triggering the vulnerable code.", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "curl: FTP path trickery leads to NIL byte out of bounds write", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "Dario Weisser", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-1000121", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, discovery_date: "2018-03-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1552631", }, ], notes: [ { category: "description", text: "A NULL pointer dereference flaw was found in the way libcurl checks values returned by the openldap ldap_get_attribute_ber() function. A malicious LDAP server could use this flaw to crash a libcurl client application via a specially crafted LDAP reply.", title: "Vulnerability description", }, { category: "summary", text: "curl: LDAP NULL pointer dereference", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1000121", }, { category: "external", summary: "RHBZ#1552631", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1552631", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1000121", url: "https://www.cve.org/CVERecord?id=CVE-2018-1000121", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000121", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000121", }, { category: "external", summary: "https://curl.haxx.se/docs/adv_2018-97a2.html", url: "https://curl.haxx.se/docs/adv_2018-97a2.html", }, ], release_date: "2018-03-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "curl: LDAP NULL pointer dereference", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "Max Dymond", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-1000122", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2018-03-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1553398", }, ], notes: [ { category: "description", text: "A buffer over-read exists in curl 7.20.0 to and including curl 7.58.0 in the RTSP+RTP handling code that allows an attacker to cause a denial of service or information leakage", title: "Vulnerability description", }, { category: "summary", text: "curl: RTSP RTP buffer over-read", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1000122", }, { category: "external", summary: "RHBZ#1553398", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1553398", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1000122", url: "https://www.cve.org/CVERecord?id=CVE-2018-1000122", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000122", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000122", }, { category: "external", summary: "https://curl.haxx.se/docs/adv_2018-b047.html", url: "https://curl.haxx.se/docs/adv_2018-b047.html", }, ], release_date: "2018-03-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "curl: RTSP RTP buffer over-read", }, { cve: "CVE-2019-0211", cwe: { id: "CWE-250", name: "Execution with Unnecessary Privileges", }, discovery_date: "2019-04-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1694980", }, ], notes: [ { category: "description", text: "A flaw was found in Apache where code executing in a less-privileged child process or thread could execute arbitrary code with the privilege of the parent process (usually root). An attacker having access to run arbitrary scripts on the web server (PHP, CGI etc) could use this flaw to run code on the web server with root privileges.", title: "Vulnerability description", }, { category: "summary", text: "httpd: privilege escalation from modules scripts", title: "Vulnerability summary", }, { category: "other", text: "This flaw is exploitable in httpd if it is configured to allow an untrusted user to upload and execute arbitrary scripts. Due to the nature of the flaw, the uploaded script would not run as a restricted privileged user, but rather it runs as root allowing for privilege escalation from the restricted user to root on the web server. \n\nDepending on the configuration of the server, you would need local (AV:L) privileges to place the script or network (AV:N) privileges if the server ran an application that permitted uploading scripts directly. The latter scenario is not common for unauthenticated users. Once the attacker can place the script somewhere in the web root where it can be easily exploited (AC:L). This type of setup is more common in shared hosted environments (PR:L) and would allow an attacker with access to a site on the shared hosted to impact the confidentiality, integrity, and availability (CIA:H) with no interaction (UI:N). Due to the elevated privileges obtained, there is an impact to the system beyond the web server itself (S:C).", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-0211", }, { category: "external", summary: "RHBZ#1694980", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1694980", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-0211", url: "https://www.cve.org/CVERecord?id=CVE-2019-0211", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-0211", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-0211", }, { category: "external", summary: "http://www.apache.org/dist/httpd/CHANGES_2.4", url: "http://www.apache.org/dist/httpd/CHANGES_2.4", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211", }, { category: "external", summary: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", url: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, ], release_date: "2019-04-01T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "exploit_status", date: "2021-11-03T00:00:00+00:00", details: "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, { category: "impact", details: "Important", }, ], title: "httpd: privilege escalation from modules scripts", }, { acknowledgments: [ { names: [ "Daniel Stenberg", ], organization: "the Curl project", }, { names: [ "Wenxiang Qian", ], organization: "Tencent Blade Team", summary: "Acknowledged by upstream.", }, ], cve: "CVE-2019-3822", cwe: { id: "CWE-121", name: "Stack-based Buffer Overflow", }, discovery_date: "2019-01-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1670254", }, ], notes: [ { category: "description", text: "A stack-based buffer overflow was found in the way curl handled NTLMv2 type-3 headers. When connecting to a remote malicious server which uses NTLM authentication, the flaw could cause curl to crash.", title: "Vulnerability description", }, { category: "summary", text: "curl: NTLMv2 type-3 header stack buffer overflow", title: "Vulnerability summary", }, { category: "other", text: "The versions of curl package shipped with Red Hat Enterprise Linux 5, 6, and 7 do not support NTLMv2 type-3 headers, hence they are not affected by this flaw.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-3822", }, { category: "external", summary: "RHBZ#1670254", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1670254", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-3822", url: "https://www.cve.org/CVERecord?id=CVE-2019-3822", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-3822", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-3822", }, { category: "external", summary: "https://curl.haxx.se/docs/CVE-2019-3822.html", url: "https://curl.haxx.se/docs/CVE-2019-3822.html", }, ], release_date: "2019-02-06T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, { category: "workaround", details: "Turn off NTLM authentication.", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "curl: NTLMv2 type-3 header stack buffer overflow", }, { acknowledgments: [ { names: [ "Daniel Stenberg", ], organization: "the Curl project", }, { names: [ "Brian Carpenter", ], organization: "Geeknik Labs", summary: "Acknowledged by upstream.", }, ], cve: "CVE-2019-3823", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, discovery_date: "2019-01-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1670256", }, ], notes: [ { category: "description", text: "An out-of-bounds read flaw was found in the way curl handled certain SMTP responses. A remote attacker could use this flaw to crash curl.", title: "Vulnerability description", }, { category: "summary", text: "curl: SMTP end-of-response out-of-bounds read", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-3823", }, { category: "external", summary: "RHBZ#1670256", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1670256", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-3823", url: "https://www.cve.org/CVERecord?id=CVE-2019-3823", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-3823", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-3823", }, { category: "external", summary: "https://curl.haxx.se/docs/CVE-2019-3823.html", url: "https://curl.haxx.se/docs/CVE-2019-3823.html", }, ], release_date: "2019-02-06T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, { category: "workaround", details: "Do not use SMTP authentication with curl", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "curl: SMTP end-of-response out-of-bounds read", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "l00p3r", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2019-5436", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2019-05-15T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1710620", }, ], notes: [ { category: "description", text: "A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7.19.4 through 7.64.1.", title: "Vulnerability description", }, { category: "summary", text: "curl: TFTP receive heap buffer overflow in tftp_receive_packet() function", title: "Vulnerability summary", }, { category: "other", text: "This flaw exists if the user selects to use a \"blksize\" of 504 or smaller (default is 512). The smaller size that is used, the larger the possible overflow becomes.\nUsers choosing a smaller size than default should be rare as the primary use case for changing the size is to make it larger. It is rare for users to use TFTP across the Internet. It is most commonly used within local networks.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-5436", }, { category: "external", summary: "RHBZ#1710620", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1710620", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-5436", url: "https://www.cve.org/CVERecord?id=CVE-2019-5436", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-5436", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-5436", }, { category: "external", summary: "https://curl.haxx.se/docs/CVE-2019-5436.html", url: "https://curl.haxx.se/docs/CVE-2019-5436.html", }, ], release_date: "2019-05-22T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "curl: TFTP receive heap buffer overflow in tftp_receive_packet() function", }, ], }
rhsa-2019:1543
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Red Hat JBoss Core Services Pack Apache Server 2.4.29 Service Pack 2 packages for Microsoft Windows and Oracle Solaris are now available.\n\nRed Hat Product Security has rated this release as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "This release adds the new Apache HTTP Server 2.4.29 Service Pack 2 packages that are part of the JBoss Core Services offering.\n\nThis release serves as a replacement for Red Hat JBoss Core Services\nApache HTTP Server 2.4.29 SP1, and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes, enhancements and component upgrades included in this release.\n\nSecurity Fix(es):\n\n* openssl: ROHNP - Key Extraction Side Channel in Multiple Crypto Libraries (CVE-2018-0495)\n\n* openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang (CVE-2018-0732)\n\n* libxml2: NULL pointer dereference in xpath.c:xmlXPathCompOpEval() can allow attackers to cause a denial of service (CVE-2018-14404)\n\n* curl: Out-of-bounds read in code handling HTTP/2 trailers (CVE-2018-1000005)\n\n* curl: HTTP authentication leak in redirects (CVE-2018-1000007)\n\n* curl: FTP path trickery leads to NIL byte out of bounds write (CVE-2018-1000120)\n\n* curl: RTSP RTP buffer over-read (CVE-2018-1000122)\n\n* httpd: privilege escalation from modules scripts (CVE-2019-0211)\n\nDetails around these issues, including information about CVEs, severity of the issues, and CVSS scores can be found on the CVE pages listed in the References section below.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2019:1543", url: "https://access.redhat.com/errata/RHSA-2019:1543", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp&downloadType=securityPatches&version=2.4.29", url: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp&downloadType=securityPatches&version=2.4.29", }, { category: "external", summary: "1536013", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1536013", }, { category: "external", summary: "1537125", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1537125", }, { category: "external", summary: "1552628", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1552628", }, { category: "external", summary: "1553398", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1553398", }, { category: "external", summary: "1591100", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1591100", }, { category: "external", summary: "1591163", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1591163", }, { category: "external", summary: "1595985", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1595985", }, { category: "external", summary: "1694980", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1694980", }, { category: "external", summary: "JBCS-722", url: "https://issues.redhat.com/browse/JBCS-722", }, { category: "external", summary: "JBCS-750", url: "https://issues.redhat.com/browse/JBCS-750", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1543.json", }, ], title: "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 SP2 security update", tracking: { current_release_date: "2025-04-17T15:03:54+00:00", generator: { date: "2025-04-17T15:03:54+00:00", engine: { name: "Red Hat SDEngine", version: "4.4.2", }, }, id: "RHSA-2019:1543", initial_release_date: "2019-06-18T19:08:49+00:00", revision_history: [ { date: "2019-06-18T19:08:49+00:00", number: "1", summary: "Initial version", }, { date: "2019-06-18T19:08:49+00:00", number: "2", summary: "Last updated version", }, { date: "2025-04-17T15:03:54+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "JBoss Core Services Apache HTTP Server 2.4.29 SP2", product: { name: "JBoss Core Services Apache HTTP Server 2.4.29 SP2", product_id: "JBoss Core Services Apache HTTP Server 2.4.29 SP2", product_identification_helper: { cpe: "cpe:/a:redhat:jboss_core_services:1", }, }, }, ], category: "product_family", name: "Red Hat JBoss Core Services", }, ], category: "vendor", name: "Red Hat", }, ], }, vulnerabilities: [ { cve: "CVE-2018-0495", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2018-06-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1591163", }, ], notes: [ { category: "description", text: "Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.", title: "Vulnerability description", }, { category: "summary", text: "ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries", title: "Vulnerability summary", }, { category: "other", text: "Since the 5.8.3 release, Red Hat CloudForms no longer uses libtomcrypt.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-0495", }, { category: "external", summary: "RHBZ#1591163", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1591163", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-0495", url: "https://www.cve.org/CVERecord?id=CVE-2018-0495", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-0495", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-0495", }, { category: "external", summary: "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/", url: "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/", }, ], release_date: "2018-06-13T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.1, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries", }, { cve: "CVE-2018-0732", cwe: { id: "CWE-325", name: "Missing Cryptographic Step", }, discovery_date: "2018-06-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1591100", }, ], notes: [ { category: "description", text: "During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).", title: "Vulnerability description", }, { category: "summary", text: "openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-0732", }, { category: "external", summary: "RHBZ#1591100", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1591100", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-0732", url: "https://www.cve.org/CVERecord?id=CVE-2018-0732", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-0732", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-0732", }, { category: "external", summary: "https://www.openssl.org/news/secadv/20180612.txt", url: "https://www.openssl.org/news/secadv/20180612.txt", }, ], release_date: "2018-06-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang", }, { cve: "CVE-2018-14404", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, discovery_date: "2018-06-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1595985", }, ], notes: [ { category: "description", text: "A null pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 when parsing invalid XPath expression. Applications processing untrusted XSL format inputs with the use of libxml2 library may be vulnerable to denial of service attack due to crash of the application.", title: "Vulnerability description", }, { category: "summary", text: "libxml2: NULL pointer dereference in xmlXPathCompOpEval() function in xpath.c", title: "Vulnerability summary", }, { category: "other", text: "This issue affects the versions of libxml2 as shipped with Red Hat Enterprise Linux 5. Red Hat Enterprise Linux 5 is now in Extended Life Phase of the support and maintenance life cycle. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of libxml2 as shipped with Red Hat Enterprise Linux 6. Red Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Moderate, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of libxml2 as shipped with Red Hat Enterprise Linux 7. Red Hat Product Security has rated this issue as having a security impact of Moderate. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-14404", }, { category: "external", summary: "RHBZ#1595985", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1595985", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-14404", url: "https://www.cve.org/CVERecord?id=CVE-2018-14404", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-14404", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-14404", }, ], release_date: "2018-06-18T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "libxml2: NULL pointer dereference in xmlXPathCompOpEval() function in xpath.c", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "Harry Sintonen", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-16839", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2018-10-22T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1642201", }, ], notes: [ { category: "description", text: "Curl versions 7.33.0 through 7.61.1 are vulnerable to a buffer overrun in the SASL authentication code that may lead to denial of service.", title: "Vulnerability description", }, { category: "summary", text: "curl: Integer overflow leading to heap-based buffer overflow in Curl_sasl_create_plain_message()", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-16839", }, { category: "external", summary: "RHBZ#1642201", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1642201", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-16839", url: "https://www.cve.org/CVERecord?id=CVE-2018-16839", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-16839", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-16839", }, { category: "external", summary: "https://curl.haxx.se/docs/CVE-2018-16839.html", url: "https://curl.haxx.se/docs/CVE-2018-16839.html", }, ], release_date: "2018-10-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "curl: Integer overflow leading to heap-based buffer overflow in Curl_sasl_create_plain_message()", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "Brian Carpenter", ], organization: "Geeknik Labs", summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-16840", cwe: { id: "CWE-416", name: "Use After Free", }, discovery_date: "2018-10-22T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1642203", }, ], notes: [ { category: "description", text: "A heap use-after-free flaw was found in curl versions from 7.59.0 through 7.61.1 in the code related to closing an easy handle. When closing and cleaning up an 'easy' handle in the `Curl_close()` function, the library code first frees a struct (without nulling the pointer) and might then subsequently erroneously write to a struct field within that already freed struct.", title: "Vulnerability description", }, { category: "summary", text: "curl: Use-after-free when closing \"easy\" handle in Curl_close()", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-16840", }, { category: "external", summary: "RHBZ#1642203", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1642203", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-16840", url: "https://www.cve.org/CVERecord?id=CVE-2018-16840", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-16840", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-16840", }, { category: "external", summary: "https://curl.haxx.se/docs/CVE-2018-16840.html", url: "https://curl.haxx.se/docs/CVE-2018-16840.html", }, ], release_date: "2018-10-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "curl: Use-after-free when closing \"easy\" handle in Curl_close()", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "Brian Carpenter", ], organization: "Geeknik Labs", summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-16842", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, discovery_date: "2018-10-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1644124", }, ], notes: [ { category: "description", text: "Curl versions 7.14.1 through 7.61.1 are vulnerable to a heap-based buffer over-read in the tool_msgs.c:voutf() function that may result in information exposure and denial of service.", title: "Vulnerability description", }, { category: "summary", text: "curl: Heap-based buffer over-read in the curl tool warning formatting", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-16842", }, { category: "external", summary: "RHBZ#1644124", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1644124", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-16842", url: "https://www.cve.org/CVERecord?id=CVE-2018-16842", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-16842", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-16842", }, { category: "external", summary: "https://curl.haxx.se/docs/CVE-2018-16842.html", url: "https://curl.haxx.se/docs/CVE-2018-16842.html", }, ], release_date: "2018-10-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 3.6, baseSeverity: "LOW", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "curl: Heap-based buffer over-read in the curl tool warning formatting", }, { acknowledgments: [ { names: [ "Daniel Stenberg", ], organization: "the Curl project", }, { names: [ "Wenxiang Qian", ], organization: "Tencent Blade Team", summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-16890", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, discovery_date: "2019-01-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1670252", }, ], notes: [ { category: "description", text: "An out-of-bounds read flaw was found in the way curl handled NTLMv2 type-2 headers. When connecting to a remote malicious server which uses NTLM authentication, the flaw could cause curl to crash.", title: "Vulnerability description", }, { category: "summary", text: "curl: NTLM type-2 heap out-of-bounds buffer read", title: "Vulnerability summary", }, { category: "other", text: "The versions of curl package shipped with Red Hat Enterprise Linux 5, 6, and 7 do not support NTLMv2 type-2 headers, hence they are not affected by this flaw.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-16890", }, { category: "external", summary: "RHBZ#1670252", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1670252", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-16890", url: "https://www.cve.org/CVERecord?id=CVE-2018-16890", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-16890", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-16890", }, { category: "external", summary: "https://curl.haxx.se/docs/CVE-2018-16890.html", url: "https://curl.haxx.se/docs/CVE-2018-16890.html", }, ], release_date: "2019-02-06T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, { category: "workaround", details: "Turn off NTLM authentication.", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "curl: NTLM type-2 heap out-of-bounds buffer read", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "Zhouyihai Ding", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-1000005", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, discovery_date: "2018-01-17T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1536013", }, ], notes: [ { category: "description", text: "libcurl 7.49.0 to and including 7.57.0 contains an out bounds read in code handling HTTP/2 trailers. It was reported (https://github.com/curl/curl/pull/2231) that reading an HTTP/2 trailer could mess up future trailers since the stored size was one byte less than required. The problem is that the code that creates HTTP/1-like headers from the HTTP/2 trailer data once appended a string like `:` to the target buffer, while this was recently changed to `: ` (a space was added after the colon) but the following math wasn't updated correspondingly. When accessed, the data is read out of bounds and causes either a crash or that the (too large) data gets passed to client write. This could lead to a denial-of-service situation or an information disclosure if someone has a service that echoes back or uses the trailers for something.", title: "Vulnerability description", }, { category: "summary", text: "curl: Out-of-bounds read in code handling HTTP/2 trailers", title: "Vulnerability summary", }, { category: "other", text: "This flaw was introduced in curl-7.49.0. Therefore the versions of curl shipped with Red Hat Enterprise Linux 5, 6 and 7 and Red Hat Ceph Storage 2 are not affected by this flaw.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1000005", }, { category: "external", summary: "RHBZ#1536013", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1536013", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1000005", url: "https://www.cve.org/CVERecord?id=CVE-2018-1000005", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000005", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000005", }, { category: "external", summary: "https://curl.haxx.se/docs/adv_2018-824a.html", url: "https://curl.haxx.se/docs/adv_2018-824a.html", }, ], release_date: "2018-01-24T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "curl: Out-of-bounds read in code handling HTTP/2 trailers", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "Craig de Stigter", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-1000007", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2018-01-19T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1537125", }, ], notes: [ { category: "description", text: "It was found that curl and libcurl might send their Authentication header to a third party HTTP server upon receiving an HTTP REDIRECT reply. This could leak authentication token to external entities.", title: "Vulnerability description", }, { category: "summary", text: "curl: HTTP authentication leak in redirects", title: "Vulnerability summary", }, { category: "other", text: "This issue affects the versions of curl as shipped with Red Hat Enterprise Linux 5, 6, and 7, as well as the versions of httpd24-curl as shipped with Red Hat Software Collections. Red Hat Product Security has rated this issue as having Moderate security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1000007", }, { category: "external", summary: "RHBZ#1537125", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1537125", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1000007", url: "https://www.cve.org/CVERecord?id=CVE-2018-1000007", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000007", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000007", }, { category: "external", summary: "https://curl.haxx.se/docs/adv_2018-b3bf.html", url: "https://curl.haxx.se/docs/adv_2018-b3bf.html", }, ], release_date: "2018-01-24T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, { category: "workaround", details: "By default, curl and libcurl will not follow redirect requests.\nThis flaw happens only when curl or libcurl are explicitly requested to follow redirects (option --location in curl, and CURLOPT_FOLLOWLOCATION in libcurl).\nTo mitigate this, it is possible to prevent the automated following of redirects, replacing it by manual redirects (and remove the authentication header), for example.", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "curl: HTTP authentication leak in redirects", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "Duy Phan Thanh", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-1000120", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2018-03-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1552628", }, ], notes: [ { category: "description", text: "It was found that libcurl did not safely parse FTP URLs when using the CURLOPT_FTP_FILEMETHOD method. An attacker, able to provide a specially crafted FTP URL to an application using libcurl, could write a NULL byte at an arbitrary location, resulting in a crash or an unspecified behavior.", title: "Vulnerability description", }, { category: "summary", text: "curl: FTP path trickery leads to NIL byte out of bounds write", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1000120", }, { category: "external", summary: "RHBZ#1552628", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1552628", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1000120", url: "https://www.cve.org/CVERecord?id=CVE-2018-1000120", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000120", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000120", }, { category: "external", summary: "https://curl.haxx.se/docs/adv_2018-9cd6.html", url: "https://curl.haxx.se/docs/adv_2018-9cd6.html", }, ], release_date: "2018-03-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, { category: "workaround", details: "Preventing application from using non-default CURLOPT_FTP_FILEMETHOD will avoid triggering the vulnerable code.", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "curl: FTP path trickery leads to NIL byte out of bounds write", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "Dario Weisser", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-1000121", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, discovery_date: "2018-03-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1552631", }, ], notes: [ { category: "description", text: "A NULL pointer dereference flaw was found in the way libcurl checks values returned by the openldap ldap_get_attribute_ber() function. A malicious LDAP server could use this flaw to crash a libcurl client application via a specially crafted LDAP reply.", title: "Vulnerability description", }, { category: "summary", text: "curl: LDAP NULL pointer dereference", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1000121", }, { category: "external", summary: "RHBZ#1552631", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1552631", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1000121", url: "https://www.cve.org/CVERecord?id=CVE-2018-1000121", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000121", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000121", }, { category: "external", summary: "https://curl.haxx.se/docs/adv_2018-97a2.html", url: "https://curl.haxx.se/docs/adv_2018-97a2.html", }, ], release_date: "2018-03-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "curl: LDAP NULL pointer dereference", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "Max Dymond", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-1000122", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2018-03-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1553398", }, ], notes: [ { category: "description", text: "A buffer over-read exists in curl 7.20.0 to and including curl 7.58.0 in the RTSP+RTP handling code that allows an attacker to cause a denial of service or information leakage", title: "Vulnerability description", }, { category: "summary", text: "curl: RTSP RTP buffer over-read", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1000122", }, { category: "external", summary: "RHBZ#1553398", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1553398", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1000122", url: "https://www.cve.org/CVERecord?id=CVE-2018-1000122", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000122", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000122", }, { category: "external", summary: "https://curl.haxx.se/docs/adv_2018-b047.html", url: "https://curl.haxx.se/docs/adv_2018-b047.html", }, ], release_date: "2018-03-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "curl: RTSP RTP buffer over-read", }, { cve: "CVE-2019-0211", cwe: { id: "CWE-250", name: "Execution with Unnecessary Privileges", }, discovery_date: "2019-04-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1694980", }, ], notes: [ { category: "description", text: "A flaw was found in Apache where code executing in a less-privileged child process or thread could execute arbitrary code with the privilege of the parent process (usually root). An attacker having access to run arbitrary scripts on the web server (PHP, CGI etc) could use this flaw to run code on the web server with root privileges.", title: "Vulnerability description", }, { category: "summary", text: "httpd: privilege escalation from modules scripts", title: "Vulnerability summary", }, { category: "other", text: "This flaw is exploitable in httpd if it is configured to allow an untrusted user to upload and execute arbitrary scripts. Due to the nature of the flaw, the uploaded script would not run as a restricted privileged user, but rather it runs as root allowing for privilege escalation from the restricted user to root on the web server. \n\nDepending on the configuration of the server, you would need local (AV:L) privileges to place the script or network (AV:N) privileges if the server ran an application that permitted uploading scripts directly. The latter scenario is not common for unauthenticated users. Once the attacker can place the script somewhere in the web root where it can be easily exploited (AC:L). This type of setup is more common in shared hosted environments (PR:L) and would allow an attacker with access to a site on the shared hosted to impact the confidentiality, integrity, and availability (CIA:H) with no interaction (UI:N). Due to the elevated privileges obtained, there is an impact to the system beyond the web server itself (S:C).", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-0211", }, { category: "external", summary: "RHBZ#1694980", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1694980", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-0211", url: "https://www.cve.org/CVERecord?id=CVE-2019-0211", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-0211", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-0211", }, { category: "external", summary: "http://www.apache.org/dist/httpd/CHANGES_2.4", url: "http://www.apache.org/dist/httpd/CHANGES_2.4", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211", }, { category: "external", summary: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", url: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, ], release_date: "2019-04-01T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "exploit_status", date: "2021-11-03T00:00:00+00:00", details: "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, { category: "impact", details: "Important", }, ], title: "httpd: privilege escalation from modules scripts", }, { acknowledgments: [ { names: [ "Daniel Stenberg", ], organization: "the Curl project", }, { names: [ "Wenxiang Qian", ], organization: "Tencent Blade Team", summary: "Acknowledged by upstream.", }, ], cve: "CVE-2019-3822", cwe: { id: "CWE-121", name: "Stack-based Buffer Overflow", }, discovery_date: "2019-01-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1670254", }, ], notes: [ { category: "description", text: "A stack-based buffer overflow was found in the way curl handled NTLMv2 type-3 headers. When connecting to a remote malicious server which uses NTLM authentication, the flaw could cause curl to crash.", title: "Vulnerability description", }, { category: "summary", text: "curl: NTLMv2 type-3 header stack buffer overflow", title: "Vulnerability summary", }, { category: "other", text: "The versions of curl package shipped with Red Hat Enterprise Linux 5, 6, and 7 do not support NTLMv2 type-3 headers, hence they are not affected by this flaw.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-3822", }, { category: "external", summary: "RHBZ#1670254", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1670254", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-3822", url: "https://www.cve.org/CVERecord?id=CVE-2019-3822", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-3822", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-3822", }, { category: "external", summary: "https://curl.haxx.se/docs/CVE-2019-3822.html", url: "https://curl.haxx.se/docs/CVE-2019-3822.html", }, ], release_date: "2019-02-06T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, { category: "workaround", details: "Turn off NTLM authentication.", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "curl: NTLMv2 type-3 header stack buffer overflow", }, { acknowledgments: [ { names: [ "Daniel Stenberg", ], organization: "the Curl project", }, { names: [ "Brian Carpenter", ], organization: "Geeknik Labs", summary: "Acknowledged by upstream.", }, ], cve: "CVE-2019-3823", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, discovery_date: "2019-01-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1670256", }, ], notes: [ { category: "description", text: "An out-of-bounds read flaw was found in the way curl handled certain SMTP responses. A remote attacker could use this flaw to crash curl.", title: "Vulnerability description", }, { category: "summary", text: "curl: SMTP end-of-response out-of-bounds read", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-3823", }, { category: "external", summary: "RHBZ#1670256", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1670256", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-3823", url: "https://www.cve.org/CVERecord?id=CVE-2019-3823", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-3823", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-3823", }, { category: "external", summary: "https://curl.haxx.se/docs/CVE-2019-3823.html", url: "https://curl.haxx.se/docs/CVE-2019-3823.html", }, ], release_date: "2019-02-06T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, { category: "workaround", details: "Do not use SMTP authentication with curl", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "curl: SMTP end-of-response out-of-bounds read", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "l00p3r", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2019-5436", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2019-05-15T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1710620", }, ], notes: [ { category: "description", text: "A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7.19.4 through 7.64.1.", title: "Vulnerability description", }, { category: "summary", text: "curl: TFTP receive heap buffer overflow in tftp_receive_packet() function", title: "Vulnerability summary", }, { category: "other", text: "This flaw exists if the user selects to use a \"blksize\" of 504 or smaller (default is 512). The smaller size that is used, the larger the possible overflow becomes.\nUsers choosing a smaller size than default should be rare as the primary use case for changing the size is to make it larger. It is rare for users to use TFTP across the Internet. It is most commonly used within local networks.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-5436", }, { category: "external", summary: "RHBZ#1710620", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1710620", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-5436", url: "https://www.cve.org/CVERecord?id=CVE-2019-5436", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-5436", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-5436", }, { category: "external", summary: "https://curl.haxx.se/docs/CVE-2019-5436.html", url: "https://curl.haxx.se/docs/CVE-2019-5436.html", }, ], release_date: "2019-05-22T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "curl: TFTP receive heap buffer overflow in tftp_receive_packet() function", }, ], }
rhsa-2019_1296
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Red Hat JBoss Core Services Pack Apache Server 2.4.29 Service Pack 2 zip release for RHEL 6 and RHEL 7 is available.\n\nRed Hat Product Security has rated this release as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.\n\nThis release adds the new Apache HTTP Server 2.4.29 Service Pack 2 packages that are part of the JBoss Core Services offering. It serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.29 SP1, and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes, enhancements and component upgrades included in this release.\n\nSecurity Fix(es):\n\n* openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang (CVE-2018-0732)\n\n* openssl: ROHNP - Key Extraction Side Channel in Multiple Crypto Libraries (CVE-2018-0495)\n\n* httpd: privilege escalation from modules scripts (CVE-2019-0211)\n\nDetails around this issue, including information about the CVE, severity of the issue, and CVSS scores can be found on the CVE pages listed in the References section below.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2019:1296", url: "https://access.redhat.com/errata/RHSA-2019:1296", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp&downloadType=securityPatches&version=2.4.29", url: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp&downloadType=securityPatches&version=2.4.29", }, { category: "external", summary: "1591100", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1591100", }, { category: "external", summary: "1591163", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1591163", }, { category: "external", summary: "1694980", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1694980", }, { category: "external", summary: "JBCS-620", url: "https://issues.redhat.com/browse/JBCS-620", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1296.json", }, ], title: "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 SP2 security update", tracking: { current_release_date: "2024-11-22T12:07:55+00:00", generator: { date: "2024-11-22T12:07:55+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2019:1296", initial_release_date: "2019-05-30T14:48:20+00:00", revision_history: [ { date: "2019-05-30T14:48:20+00:00", number: "1", summary: "Initial version", }, { date: "2019-05-30T14:48:20+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T12:07:55+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "JBoss Core Services Apache HTTP Server 2.4.29 SP2", product: { name: "JBoss Core Services Apache HTTP Server 2.4.29 SP2", product_id: "JBoss Core Services Apache HTTP Server 2.4.29 SP2", product_identification_helper: { cpe: "cpe:/a:redhat:jboss_core_services:1", }, }, }, ], category: "product_family", name: "Red Hat JBoss Core Services", }, ], category: "vendor", name: "Red Hat", }, ], }, vulnerabilities: [ { cve: "CVE-2018-0495", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2018-06-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1591163", }, ], notes: [ { category: "description", text: "Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.", title: "Vulnerability description", }, { category: "summary", text: "ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries", title: "Vulnerability summary", }, { category: "other", text: "Since the 5.8.3 release, Red Hat CloudForms no longer uses libtomcrypt.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-0495", }, { category: "external", summary: "RHBZ#1591163", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1591163", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-0495", url: "https://www.cve.org/CVERecord?id=CVE-2018-0495", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-0495", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-0495", }, { category: "external", summary: "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/", url: "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/", }, ], release_date: "2018-06-13T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-05-30T14:48:20+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1296", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.1, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries", }, { cve: "CVE-2018-0732", cwe: { id: "CWE-325", name: "Missing Cryptographic Step", }, discovery_date: "2018-06-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1591100", }, ], notes: [ { category: "description", text: "During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).", title: "Vulnerability description", }, { category: "summary", text: "openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-0732", }, { category: "external", summary: "RHBZ#1591100", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1591100", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-0732", url: "https://www.cve.org/CVERecord?id=CVE-2018-0732", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-0732", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-0732", }, { category: "external", summary: "https://www.openssl.org/news/secadv/20180612.txt", url: "https://www.openssl.org/news/secadv/20180612.txt", }, ], release_date: "2018-06-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-05-30T14:48:20+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1296", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang", }, { cve: "CVE-2019-0211", cwe: { id: "CWE-250", name: "Execution with Unnecessary Privileges", }, discovery_date: "2019-04-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1694980", }, ], notes: [ { category: "description", text: "A flaw was found in Apache where code executing in a less-privileged child process or thread could execute arbitrary code with the privilege of the parent process (usually root). An attacker having access to run arbitrary scripts on the web server (PHP, CGI etc) could use this flaw to run code on the web server with root privileges.", title: "Vulnerability description", }, { category: "summary", text: "httpd: privilege escalation from modules scripts", title: "Vulnerability summary", }, { category: "other", text: "This flaw is exploitable in httpd if it is configured to allow an untrusted user to upload and execute arbitrary scripts. Due to the nature of the flaw, the uploaded script would not run as a restricted privileged user, but rather it runs as root allowing for privilege escalation from the restricted user to root on the web server. \n\nDepending on the configuration of the server, you would need local (AV:L) privileges to place the script or network (AV:N) privileges if the server ran an application that permitted uploading scripts directly. The latter scenario is not common for unauthenticated users. Once the attacker can place the script somewhere in the web root where it can be easily exploited (AC:L). This type of setup is more common in shared hosted environments (PR:L) and would allow an attacker with access to a site on the shared hosted to impact the confidentiality, integrity, and availability (CIA:H) with no interaction (UI:N). Due to the elevated privileges obtained, there is an impact to the system beyond the web server itself (S:C).", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-0211", }, { category: "external", summary: "RHBZ#1694980", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1694980", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-0211", url: "https://www.cve.org/CVERecord?id=CVE-2019-0211", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-0211", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-0211", }, { category: "external", summary: "http://www.apache.org/dist/httpd/CHANGES_2.4", url: "http://www.apache.org/dist/httpd/CHANGES_2.4", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211", }, { category: "external", summary: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", url: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, ], release_date: "2019-04-01T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-05-30T14:48:20+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1296", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "exploit_status", date: "2021-11-03T00:00:00+00:00", details: "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, { category: "impact", details: "Important", }, ], title: "httpd: privilege escalation from modules scripts", }, ], }
rhsa-2019:0746
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for httpd24-httpd and httpd24-mod_auth_mellon is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The Apache HTTP Server is a powerful, efficient, and extensible web server. The httpd24 packages provide a recent stable release of version 2.4 of the Apache HTTP Server, along with the mod_auth_kerb module.\n\nSecurity Fix(es):\n\n* httpd: privilege escalation from modules scripts (CVE-2019-0211)\n\n* mod_auth_mellon: authentication bypass in ECP flow (CVE-2019-3878)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2019:0746", url: "https://access.redhat.com/errata/RHSA-2019:0746", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "1691126", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1691126", }, { category: "external", summary: "1694980", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1694980", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_0746.json", }, ], title: "Red Hat Security Advisory: httpd24-httpd and httpd24-mod_auth_mellon security update", tracking: { current_release_date: "2024-11-15T05:13:02+00:00", generator: { date: "2024-11-15T05:13:02+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2019:0746", initial_release_date: "2019-04-11T11:59:20+00:00", revision_history: [ { date: "2019-04-11T11:59:20+00:00", number: "1", summary: "Initial version", }, { date: "2019-04-11T11:59:20+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-15T05:13:02+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", product: { name: "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-RHSCL-3.2", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_software_collections:3::el6", }, }, }, { category: "product_name", name: "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", product: { name: "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-RHSCL-3.2", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_software_collections:3::el6", }, }, }, { category: "product_name", name: "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product: { name: "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_software_collections:3::el7", }, }, }, { category: "product_name", name: "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product: { name: "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_software_collections:3::el7", }, }, }, { category: "product_name", name: "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product: { name: "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_software_collections:3::el7", }, }, }, { category: "product_name", name: "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product: { name: "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_software_collections:3::el7", }, }, }, { category: "product_name", name: "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product: { name: "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_software_collections:3::el7", }, }, }, { category: "product_name", name: "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product: { name: "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_software_collections:3::el7", }, }, }, ], category: "product_family", name: "Red Hat Software Collections", }, { branches: [ { category: "product_version", name: "httpd24-httpd-0:2.4.34-7.el6.1.x86_64", product: { name: "httpd24-httpd-0:2.4.34-7.el6.1.x86_64", product_id: "httpd24-httpd-0:2.4.34-7.el6.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd@2.4.34-7.el6.1?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", product: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", product_id: "httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.34-7.el6.1?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", product: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", product_id: "httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.34-7.el6.1?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", product: { name: "httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", product_id: "httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_ldap@2.4.34-7.el6.1?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", product: { name: "httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", product_id: "httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_ssl@2.4.34-7.el6.1?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", product: { name: "httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", product_id: "httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_session@2.4.34-7.el6.1?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", product: { name: "httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", product_id: "httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-tools@2.4.34-7.el6.1?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", product: { name: "httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", product_id: "httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-devel@2.4.34-7.el6.1?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", product: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", product_id: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_auth_mellon-debuginfo@0.13.1-2.el7.1?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", product: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", product_id: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_auth_mellon@0.13.1-2.el7.1?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", product: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", product_id: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.34-7.el7.1?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", product: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", product_id: "httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_md@2.4.34-7.el7.1?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", product: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", product_id: "httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-devel@2.4.34-7.el7.1?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", product: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", product_id: "httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_ssl@2.4.34-7.el7.1?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", product: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", product_id: "httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_ldap@2.4.34-7.el7.1?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-httpd-0:2.4.34-7.el7.1.x86_64", product: { name: "httpd24-httpd-0:2.4.34-7.el7.1.x86_64", product_id: "httpd24-httpd-0:2.4.34-7.el7.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd@2.4.34-7.el7.1?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", product: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", product_id: "httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-tools@2.4.34-7.el7.1?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", product: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", product_id: "httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_session@2.4.34-7.el7.1?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", product: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", product_id: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.34-7.el7.1?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "httpd24-httpd-0:2.4.34-7.el6.1.src", product: { name: "httpd24-httpd-0:2.4.34-7.el6.1.src", product_id: "httpd24-httpd-0:2.4.34-7.el6.1.src", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd@2.4.34-7.el6.1?arch=src", }, }, }, { category: "product_version", name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", product: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", product_id: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_auth_mellon@0.13.1-2.el7.1?arch=src", }, }, }, { category: "product_version", name: "httpd24-httpd-0:2.4.34-7.el7.1.src", product: { name: "httpd24-httpd-0:2.4.34-7.el7.1.src", product_id: "httpd24-httpd-0:2.4.34-7.el7.1.src", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd@2.4.34-7.el7.1?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", product: { name: "httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", product_id: "httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-manual@2.4.34-7.el6.1?arch=noarch", }, }, }, { category: "product_version", name: "httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", product: { name: "httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", product_id: "httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-manual@2.4.34-7.el7.1?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", product: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", product_id: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_auth_mellon-debuginfo@0.13.1-2.el7.1?arch=aarch64", }, }, }, { category: "product_version", name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", product: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", product_id: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_auth_mellon@0.13.1-2.el7.1?arch=aarch64", }, }, }, { category: "product_version", name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", product: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", product_id: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.34-7.el7.1?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", product: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", product_id: "httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_md@2.4.34-7.el7.1?arch=aarch64", }, }, }, { category: "product_version", name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", product: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", product_id: "httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-devel@2.4.34-7.el7.1?arch=aarch64", }, }, }, { category: "product_version", name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", product: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", product_id: "httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_ssl@2.4.34-7.el7.1?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", product: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", product_id: "httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_ldap@2.4.34-7.el7.1?arch=aarch64", }, }, }, { category: "product_version", name: "httpd24-httpd-0:2.4.34-7.el7.1.aarch64", product: { name: "httpd24-httpd-0:2.4.34-7.el7.1.aarch64", product_id: "httpd24-httpd-0:2.4.34-7.el7.1.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd@2.4.34-7.el7.1?arch=aarch64", }, }, }, { category: "product_version", name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", product: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", product_id: "httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-tools@2.4.34-7.el7.1?arch=aarch64", }, }, }, { category: "product_version", name: "httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", product: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", product_id: "httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_session@2.4.34-7.el7.1?arch=aarch64", }, }, }, { category: "product_version", name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", product: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", product_id: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.34-7.el7.1?arch=aarch64", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", product: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", product_id: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_auth_mellon-debuginfo@0.13.1-2.el7.1?arch=s390x", }, }, }, { category: "product_version", name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", product: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", product_id: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_auth_mellon@0.13.1-2.el7.1?arch=s390x", }, }, }, { category: "product_version", name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", product: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", product_id: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.34-7.el7.1?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "httpd24-mod_md-0:2.4.34-7.el7.1.s390x", product: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.s390x", product_id: "httpd24-mod_md-0:2.4.34-7.el7.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_md@2.4.34-7.el7.1?arch=s390x", }, }, }, { category: "product_version", name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", product: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", product_id: "httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-devel@2.4.34-7.el7.1?arch=s390x", }, }, }, { category: "product_version", name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", product: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", product_id: "httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_ssl@2.4.34-7.el7.1?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", product: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", product_id: "httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_ldap@2.4.34-7.el7.1?arch=s390x", }, }, }, { category: "product_version", name: "httpd24-httpd-0:2.4.34-7.el7.1.s390x", product: { name: "httpd24-httpd-0:2.4.34-7.el7.1.s390x", product_id: "httpd24-httpd-0:2.4.34-7.el7.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd@2.4.34-7.el7.1?arch=s390x", }, }, }, { category: "product_version", name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", product: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", product_id: "httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-tools@2.4.34-7.el7.1?arch=s390x", }, }, }, { category: "product_version", name: "httpd24-mod_session-0:2.4.34-7.el7.1.s390x", product: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.s390x", product_id: "httpd24-mod_session-0:2.4.34-7.el7.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_session@2.4.34-7.el7.1?arch=s390x", }, }, }, { category: "product_version", name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", product: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", product_id: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.34-7.el7.1?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", product: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", product_id: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_auth_mellon-debuginfo@0.13.1-2.el7.1?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", product: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", product_id: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_auth_mellon@0.13.1-2.el7.1?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", product: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", product_id: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.34-7.el7.1?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", product: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", product_id: "httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_md@2.4.34-7.el7.1?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", product: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", product_id: "httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-devel@2.4.34-7.el7.1?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", product: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", product_id: "httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_ssl@2.4.34-7.el7.1?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", product: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", product_id: "httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_ldap@2.4.34-7.el7.1?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", product: { name: "httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", product_id: "httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd@2.4.34-7.el7.1?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", product: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", product_id: "httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-tools@2.4.34-7.el7.1?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", product: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", product_id: "httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_session@2.4.34-7.el7.1?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", product: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", product_id: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.34-7.el7.1?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el6.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.src", }, product_reference: "httpd24-httpd-0:2.4.34-7.el6.1.src", relates_to_product_reference: "6Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.x86_64", }, product_reference: "httpd24-httpd-0:2.4.34-7.el6.1.x86_64", relates_to_product_reference: "6Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", relates_to_product_reference: "6Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", relates_to_product_reference: "6Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", }, product_reference: "httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", relates_to_product_reference: "6Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", relates_to_product_reference: "6Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", relates_to_product_reference: "6Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", relates_to_product_reference: "6Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", relates_to_product_reference: "6Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", relates_to_product_reference: "6Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el6.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.src", }, product_reference: "httpd24-httpd-0:2.4.34-7.el6.1.src", relates_to_product_reference: "6Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.x86_64", }, product_reference: "httpd24-httpd-0:2.4.34-7.el6.1.x86_64", relates_to_product_reference: "6Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", relates_to_product_reference: "6Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", relates_to_product_reference: "6Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", }, product_reference: "httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", relates_to_product_reference: "6Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", relates_to_product_reference: "6Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", relates_to_product_reference: "6Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", relates_to_product_reference: "6Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", relates_to_product_reference: "6Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", relates_to_product_reference: "6Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.src", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", }, product_reference: "httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.src", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", }, product_reference: "httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.src", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", }, product_reference: "httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.src", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", }, product_reference: "httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.src", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", }, product_reference: "httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.src", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", }, product_reference: "httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, ], }, vulnerabilities: [ { cve: "CVE-2019-0211", cwe: { id: "CWE-250", name: "Execution with Unnecessary Privileges", }, discovery_date: "2019-04-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1694980", }, ], notes: [ { category: "description", text: "A flaw was found in Apache where code executing in a less-privileged child process or thread could execute arbitrary code with the privilege of the parent process (usually root). An attacker having access to run arbitrary scripts on the web server (PHP, CGI etc) could use this flaw to run code on the web server with root privileges.", title: "Vulnerability description", }, { category: "summary", text: "httpd: privilege escalation from modules scripts", title: "Vulnerability summary", }, { category: "other", text: "This flaw is exploitable in httpd if it is configured to allow an untrusted user to upload and execute arbitrary scripts. Due to the nature of the flaw, the uploaded script would not run as a restricted privileged user, but rather it runs as root allowing for privilege escalation from the restricted user to root on the web server. \n\nDepending on the configuration of the server, you would need local (AV:L) privileges to place the script or network (AV:N) privileges if the server ran an application that permitted uploading scripts directly. The latter scenario is not common for unauthenticated users. Once the attacker can place the script somewhere in the web root where it can be easily exploited (AC:L). This type of setup is more common in shared hosted environments (PR:L) and would allow an attacker with access to a site on the shared hosted to impact the confidentiality, integrity, and availability (CIA:H) with no interaction (UI:N). Due to the elevated privileges obtained, there is an impact to the system beyond the web server itself (S:C).", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.src", "6Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", "6Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.src", "6Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", "6Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-0211", }, { category: "external", summary: "RHBZ#1694980", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1694980", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-0211", url: "https://www.cve.org/CVERecord?id=CVE-2019-0211", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-0211", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-0211", }, { category: "external", summary: "http://www.apache.org/dist/httpd/CHANGES_2.4", url: "http://www.apache.org/dist/httpd/CHANGES_2.4", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211", }, { category: "external", summary: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", url: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, ], release_date: "2019-04-01T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-04-11T11:59:20+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "6Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.src", "6Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", "6Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.src", "6Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", "6Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:0746", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "6Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.src", "6Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", "6Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.src", "6Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", "6Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", ], }, ], threats: [ { category: "exploit_status", date: "2021-11-03T00:00:00+00:00", details: "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, { category: "impact", details: "Important", }, ], title: "httpd: privilege escalation from modules scripts", }, { cve: "CVE-2019-3878", cwe: { id: "CWE-305", name: "Authentication Bypass by Primary Weakness", }, discovery_date: "2019-03-20T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1691126", }, ], notes: [ { category: "description", text: "A vulnerability was found in mod_auth_mellon. If Apache is configured as a reverse proxy and mod_auth_mellon is configured to only let through authenticated users (with the require valid-user directive), adding special HTTP headers that are normally used to start the special SAML ECP (non-browser based) can be used to bypass authentication.", title: "Vulnerability description", }, { category: "summary", text: "mod_auth_mellon: authentication bypass in ECP flow", title: "Vulnerability summary", }, { category: "other", text: "This issue did not affect the versions of mod_auth_mellon as shipped with Red Hat Enterprise Linux 6 as they did not include support for ECP.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.src", "6Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", "6Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.src", "6Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", "6Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-3878", }, { category: "external", summary: "RHBZ#1691126", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1691126", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-3878", url: "https://www.cve.org/CVERecord?id=CVE-2019-3878", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-3878", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-3878", }, { category: "external", summary: "https://github.com/Uninett/mod_auth_mellon/pull/196", url: "https://github.com/Uninett/mod_auth_mellon/pull/196", }, ], release_date: "2018-05-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-04-11T11:59:20+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "6Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.src", "6Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", "6Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.src", "6Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", "6Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:0746", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", version: "3.0", }, products: [ "6Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.src", "6Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", "6Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.src", "6Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", "6Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "mod_auth_mellon: authentication bypass in ECP flow", }, ], }
RHSA-2019:1296
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Red Hat JBoss Core Services Pack Apache Server 2.4.29 Service Pack 2 zip release for RHEL 6 and RHEL 7 is available.\n\nRed Hat Product Security has rated this release as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.\n\nThis release adds the new Apache HTTP Server 2.4.29 Service Pack 2 packages that are part of the JBoss Core Services offering. It serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.29 SP1, and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes, enhancements and component upgrades included in this release.\n\nSecurity Fix(es):\n\n* openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang (CVE-2018-0732)\n\n* openssl: ROHNP - Key Extraction Side Channel in Multiple Crypto Libraries (CVE-2018-0495)\n\n* httpd: privilege escalation from modules scripts (CVE-2019-0211)\n\nDetails around this issue, including information about the CVE, severity of the issue, and CVSS scores can be found on the CVE pages listed in the References section below.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2019:1296", url: "https://access.redhat.com/errata/RHSA-2019:1296", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp&downloadType=securityPatches&version=2.4.29", url: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp&downloadType=securityPatches&version=2.4.29", }, { category: "external", summary: "1591100", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1591100", }, { category: "external", summary: "1591163", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1591163", }, { category: "external", summary: "1694980", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1694980", }, { category: "external", summary: "JBCS-620", url: "https://issues.redhat.com/browse/JBCS-620", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1296.json", }, ], title: "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 SP2 security update", tracking: { current_release_date: "2024-11-22T12:07:55+00:00", generator: { date: "2024-11-22T12:07:55+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2019:1296", initial_release_date: "2019-05-30T14:48:20+00:00", revision_history: [ { date: "2019-05-30T14:48:20+00:00", number: "1", summary: "Initial version", }, { date: "2019-05-30T14:48:20+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T12:07:55+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "JBoss Core Services Apache HTTP Server 2.4.29 SP2", product: { name: "JBoss Core Services Apache HTTP Server 2.4.29 SP2", product_id: "JBoss Core Services Apache HTTP Server 2.4.29 SP2", product_identification_helper: { cpe: "cpe:/a:redhat:jboss_core_services:1", }, }, }, ], category: "product_family", name: "Red Hat JBoss Core Services", }, ], category: "vendor", name: "Red Hat", }, ], }, vulnerabilities: [ { cve: "CVE-2018-0495", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2018-06-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1591163", }, ], notes: [ { category: "description", text: "Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.", title: "Vulnerability description", }, { category: "summary", text: "ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries", title: "Vulnerability summary", }, { category: "other", text: "Since the 5.8.3 release, Red Hat CloudForms no longer uses libtomcrypt.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-0495", }, { category: "external", summary: "RHBZ#1591163", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1591163", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-0495", url: "https://www.cve.org/CVERecord?id=CVE-2018-0495", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-0495", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-0495", }, { category: "external", summary: "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/", url: "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/", }, ], release_date: "2018-06-13T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-05-30T14:48:20+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1296", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.1, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries", }, { cve: "CVE-2018-0732", cwe: { id: "CWE-325", name: "Missing Cryptographic Step", }, discovery_date: "2018-06-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1591100", }, ], notes: [ { category: "description", text: "During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).", title: "Vulnerability description", }, { category: "summary", text: "openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-0732", }, { category: "external", summary: "RHBZ#1591100", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1591100", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-0732", url: "https://www.cve.org/CVERecord?id=CVE-2018-0732", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-0732", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-0732", }, { category: "external", summary: "https://www.openssl.org/news/secadv/20180612.txt", url: "https://www.openssl.org/news/secadv/20180612.txt", }, ], release_date: "2018-06-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-05-30T14:48:20+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1296", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang", }, { cve: "CVE-2019-0211", cwe: { id: "CWE-250", name: "Execution with Unnecessary Privileges", }, discovery_date: "2019-04-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1694980", }, ], notes: [ { category: "description", text: "A flaw was found in Apache where code executing in a less-privileged child process or thread could execute arbitrary code with the privilege of the parent process (usually root). An attacker having access to run arbitrary scripts on the web server (PHP, CGI etc) could use this flaw to run code on the web server with root privileges.", title: "Vulnerability description", }, { category: "summary", text: "httpd: privilege escalation from modules scripts", title: "Vulnerability summary", }, { category: "other", text: "This flaw is exploitable in httpd if it is configured to allow an untrusted user to upload and execute arbitrary scripts. Due to the nature of the flaw, the uploaded script would not run as a restricted privileged user, but rather it runs as root allowing for privilege escalation from the restricted user to root on the web server. \n\nDepending on the configuration of the server, you would need local (AV:L) privileges to place the script or network (AV:N) privileges if the server ran an application that permitted uploading scripts directly. The latter scenario is not common for unauthenticated users. Once the attacker can place the script somewhere in the web root where it can be easily exploited (AC:L). This type of setup is more common in shared hosted environments (PR:L) and would allow an attacker with access to a site on the shared hosted to impact the confidentiality, integrity, and availability (CIA:H) with no interaction (UI:N). Due to the elevated privileges obtained, there is an impact to the system beyond the web server itself (S:C).", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-0211", }, { category: "external", summary: "RHBZ#1694980", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1694980", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-0211", url: "https://www.cve.org/CVERecord?id=CVE-2019-0211", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-0211", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-0211", }, { category: "external", summary: "http://www.apache.org/dist/httpd/CHANGES_2.4", url: "http://www.apache.org/dist/httpd/CHANGES_2.4", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211", }, { category: "external", summary: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", url: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, ], release_date: "2019-04-01T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-05-30T14:48:20+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1296", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "exploit_status", date: "2021-11-03T00:00:00+00:00", details: "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, { category: "impact", details: "Important", }, ], title: "httpd: privilege escalation from modules scripts", }, ], }
RHSA-2019:0746
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for httpd24-httpd and httpd24-mod_auth_mellon is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The Apache HTTP Server is a powerful, efficient, and extensible web server. The httpd24 packages provide a recent stable release of version 2.4 of the Apache HTTP Server, along with the mod_auth_kerb module.\n\nSecurity Fix(es):\n\n* httpd: privilege escalation from modules scripts (CVE-2019-0211)\n\n* mod_auth_mellon: authentication bypass in ECP flow (CVE-2019-3878)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2019:0746", url: "https://access.redhat.com/errata/RHSA-2019:0746", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "1691126", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1691126", }, { category: "external", summary: "1694980", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1694980", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_0746.json", }, ], title: "Red Hat Security Advisory: httpd24-httpd and httpd24-mod_auth_mellon security update", tracking: { current_release_date: "2024-11-15T05:13:02+00:00", generator: { date: "2024-11-15T05:13:02+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2019:0746", initial_release_date: "2019-04-11T11:59:20+00:00", revision_history: [ { date: "2019-04-11T11:59:20+00:00", number: "1", summary: "Initial version", }, { date: "2019-04-11T11:59:20+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-15T05:13:02+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", product: { name: "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-RHSCL-3.2", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_software_collections:3::el6", }, }, }, { category: "product_name", name: "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", product: { name: "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-RHSCL-3.2", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_software_collections:3::el6", }, }, }, { category: "product_name", name: "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product: { name: "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_software_collections:3::el7", }, }, }, { category: "product_name", name: "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product: { name: "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_software_collections:3::el7", }, }, }, { category: "product_name", name: "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product: { name: "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_software_collections:3::el7", }, }, }, { category: "product_name", name: "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product: { name: "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_software_collections:3::el7", }, }, }, { category: "product_name", name: "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product: { name: "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_software_collections:3::el7", }, }, }, { category: "product_name", name: "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product: { name: "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_software_collections:3::el7", }, }, }, ], category: "product_family", name: "Red Hat Software Collections", }, { branches: [ { category: "product_version", name: "httpd24-httpd-0:2.4.34-7.el6.1.x86_64", product: { name: "httpd24-httpd-0:2.4.34-7.el6.1.x86_64", product_id: "httpd24-httpd-0:2.4.34-7.el6.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd@2.4.34-7.el6.1?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", product: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", product_id: "httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.34-7.el6.1?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", product: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", product_id: "httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.34-7.el6.1?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", product: { name: "httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", product_id: "httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_ldap@2.4.34-7.el6.1?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", product: { name: "httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", product_id: "httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_ssl@2.4.34-7.el6.1?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", product: { name: "httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", product_id: "httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_session@2.4.34-7.el6.1?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", product: { name: "httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", product_id: "httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-tools@2.4.34-7.el6.1?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", product: { name: "httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", product_id: "httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-devel@2.4.34-7.el6.1?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", product: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", product_id: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_auth_mellon-debuginfo@0.13.1-2.el7.1?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", product: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", product_id: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_auth_mellon@0.13.1-2.el7.1?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", product: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", product_id: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.34-7.el7.1?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", product: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", product_id: "httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_md@2.4.34-7.el7.1?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", product: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", product_id: "httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-devel@2.4.34-7.el7.1?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", product: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", product_id: "httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_ssl@2.4.34-7.el7.1?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", product: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", product_id: "httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_ldap@2.4.34-7.el7.1?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-httpd-0:2.4.34-7.el7.1.x86_64", product: { name: "httpd24-httpd-0:2.4.34-7.el7.1.x86_64", product_id: "httpd24-httpd-0:2.4.34-7.el7.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd@2.4.34-7.el7.1?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", product: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", product_id: "httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-tools@2.4.34-7.el7.1?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", product: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", product_id: "httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_session@2.4.34-7.el7.1?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", product: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", product_id: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.34-7.el7.1?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "httpd24-httpd-0:2.4.34-7.el6.1.src", product: { name: "httpd24-httpd-0:2.4.34-7.el6.1.src", product_id: "httpd24-httpd-0:2.4.34-7.el6.1.src", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd@2.4.34-7.el6.1?arch=src", }, }, }, { category: "product_version", name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", product: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", product_id: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_auth_mellon@0.13.1-2.el7.1?arch=src", }, }, }, { category: "product_version", name: "httpd24-httpd-0:2.4.34-7.el7.1.src", product: { name: "httpd24-httpd-0:2.4.34-7.el7.1.src", product_id: "httpd24-httpd-0:2.4.34-7.el7.1.src", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd@2.4.34-7.el7.1?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", product: { name: "httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", product_id: "httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-manual@2.4.34-7.el6.1?arch=noarch", }, }, }, { category: "product_version", name: "httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", product: { name: "httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", product_id: "httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-manual@2.4.34-7.el7.1?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", product: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", product_id: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_auth_mellon-debuginfo@0.13.1-2.el7.1?arch=aarch64", }, }, }, { category: "product_version", name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", product: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", product_id: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_auth_mellon@0.13.1-2.el7.1?arch=aarch64", }, }, }, { category: "product_version", name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", product: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", product_id: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.34-7.el7.1?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", product: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", product_id: "httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_md@2.4.34-7.el7.1?arch=aarch64", }, }, }, { category: "product_version", name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", product: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", product_id: "httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-devel@2.4.34-7.el7.1?arch=aarch64", }, }, }, { category: "product_version", name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", product: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", product_id: "httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_ssl@2.4.34-7.el7.1?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", product: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", product_id: "httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_ldap@2.4.34-7.el7.1?arch=aarch64", }, }, }, { category: "product_version", name: "httpd24-httpd-0:2.4.34-7.el7.1.aarch64", product: { name: "httpd24-httpd-0:2.4.34-7.el7.1.aarch64", product_id: "httpd24-httpd-0:2.4.34-7.el7.1.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd@2.4.34-7.el7.1?arch=aarch64", }, }, }, { category: "product_version", name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", product: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", product_id: "httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-tools@2.4.34-7.el7.1?arch=aarch64", }, }, }, { category: "product_version", name: "httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", product: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", product_id: "httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_session@2.4.34-7.el7.1?arch=aarch64", }, }, }, { category: "product_version", name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", product: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", product_id: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.34-7.el7.1?arch=aarch64", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", product: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", product_id: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_auth_mellon-debuginfo@0.13.1-2.el7.1?arch=s390x", }, }, }, { category: "product_version", name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", product: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", product_id: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_auth_mellon@0.13.1-2.el7.1?arch=s390x", }, }, }, { category: "product_version", name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", product: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", product_id: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.34-7.el7.1?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "httpd24-mod_md-0:2.4.34-7.el7.1.s390x", product: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.s390x", product_id: "httpd24-mod_md-0:2.4.34-7.el7.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_md@2.4.34-7.el7.1?arch=s390x", }, }, }, { category: "product_version", name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", product: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", product_id: "httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-devel@2.4.34-7.el7.1?arch=s390x", }, }, }, { category: "product_version", name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", product: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", product_id: "httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_ssl@2.4.34-7.el7.1?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", product: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", product_id: "httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_ldap@2.4.34-7.el7.1?arch=s390x", }, }, }, { category: "product_version", name: "httpd24-httpd-0:2.4.34-7.el7.1.s390x", product: { name: "httpd24-httpd-0:2.4.34-7.el7.1.s390x", product_id: "httpd24-httpd-0:2.4.34-7.el7.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd@2.4.34-7.el7.1?arch=s390x", }, }, }, { category: "product_version", name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", product: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", product_id: "httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-tools@2.4.34-7.el7.1?arch=s390x", }, }, }, { category: "product_version", name: "httpd24-mod_session-0:2.4.34-7.el7.1.s390x", product: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.s390x", product_id: "httpd24-mod_session-0:2.4.34-7.el7.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_session@2.4.34-7.el7.1?arch=s390x", }, }, }, { category: "product_version", name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", product: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", product_id: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.34-7.el7.1?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", product: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", product_id: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_auth_mellon-debuginfo@0.13.1-2.el7.1?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", product: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", product_id: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_auth_mellon@0.13.1-2.el7.1?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", product: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", product_id: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.34-7.el7.1?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", product: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", product_id: "httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_md@2.4.34-7.el7.1?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", product: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", product_id: "httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-devel@2.4.34-7.el7.1?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", product: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", product_id: "httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_ssl@2.4.34-7.el7.1?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", product: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", product_id: "httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_ldap@2.4.34-7.el7.1?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", product: { name: "httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", product_id: "httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd@2.4.34-7.el7.1?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", product: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", product_id: "httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-tools@2.4.34-7.el7.1?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", product: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", product_id: "httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_session@2.4.34-7.el7.1?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", product: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", product_id: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.34-7.el7.1?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el6.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.src", }, product_reference: "httpd24-httpd-0:2.4.34-7.el6.1.src", relates_to_product_reference: "6Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.x86_64", }, product_reference: "httpd24-httpd-0:2.4.34-7.el6.1.x86_64", relates_to_product_reference: "6Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", relates_to_product_reference: "6Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", relates_to_product_reference: "6Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", }, product_reference: "httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", relates_to_product_reference: "6Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", relates_to_product_reference: "6Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", relates_to_product_reference: "6Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", relates_to_product_reference: "6Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", relates_to_product_reference: "6Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", relates_to_product_reference: "6Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el6.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.src", }, product_reference: "httpd24-httpd-0:2.4.34-7.el6.1.src", relates_to_product_reference: "6Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.x86_64", }, product_reference: "httpd24-httpd-0:2.4.34-7.el6.1.x86_64", relates_to_product_reference: "6Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", relates_to_product_reference: "6Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", relates_to_product_reference: "6Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", }, product_reference: "httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", relates_to_product_reference: "6Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", relates_to_product_reference: "6Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", relates_to_product_reference: "6Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", relates_to_product_reference: "6Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", relates_to_product_reference: "6Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", relates_to_product_reference: "6Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.src", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", }, product_reference: "httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.src", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", }, product_reference: "httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.src", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", }, product_reference: "httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.src", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", }, product_reference: "httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.src", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", }, product_reference: "httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.src", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", }, product_reference: "httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, ], }, vulnerabilities: [ { cve: "CVE-2019-0211", cwe: { id: "CWE-250", name: "Execution with Unnecessary Privileges", }, discovery_date: "2019-04-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1694980", }, ], notes: [ { category: "description", text: "A flaw was found in Apache where code executing in a less-privileged child process or thread could execute arbitrary code with the privilege of the parent process (usually root). An attacker having access to run arbitrary scripts on the web server (PHP, CGI etc) could use this flaw to run code on the web server with root privileges.", title: "Vulnerability description", }, { category: "summary", text: "httpd: privilege escalation from modules scripts", title: "Vulnerability summary", }, { category: "other", text: "This flaw is exploitable in httpd if it is configured to allow an untrusted user to upload and execute arbitrary scripts. Due to the nature of the flaw, the uploaded script would not run as a restricted privileged user, but rather it runs as root allowing for privilege escalation from the restricted user to root on the web server. \n\nDepending on the configuration of the server, you would need local (AV:L) privileges to place the script or network (AV:N) privileges if the server ran an application that permitted uploading scripts directly. The latter scenario is not common for unauthenticated users. Once the attacker can place the script somewhere in the web root where it can be easily exploited (AC:L). This type of setup is more common in shared hosted environments (PR:L) and would allow an attacker with access to a site on the shared hosted to impact the confidentiality, integrity, and availability (CIA:H) with no interaction (UI:N). Due to the elevated privileges obtained, there is an impact to the system beyond the web server itself (S:C).", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.src", "6Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", "6Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.src", "6Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", "6Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-0211", }, { category: "external", summary: "RHBZ#1694980", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1694980", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-0211", url: "https://www.cve.org/CVERecord?id=CVE-2019-0211", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-0211", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-0211", }, { category: "external", summary: "http://www.apache.org/dist/httpd/CHANGES_2.4", url: "http://www.apache.org/dist/httpd/CHANGES_2.4", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211", }, { category: "external", summary: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", url: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, ], release_date: "2019-04-01T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-04-11T11:59:20+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "6Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.src", "6Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", "6Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.src", "6Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", "6Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:0746", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "6Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.src", "6Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", "6Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.src", "6Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", "6Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", ], }, ], threats: [ { category: "exploit_status", date: "2021-11-03T00:00:00+00:00", details: "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, { category: "impact", details: "Important", }, ], title: "httpd: privilege escalation from modules scripts", }, { cve: "CVE-2019-3878", cwe: { id: "CWE-305", name: "Authentication Bypass by Primary Weakness", }, discovery_date: "2019-03-20T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1691126", }, ], notes: [ { category: "description", text: "A vulnerability was found in mod_auth_mellon. If Apache is configured as a reverse proxy and mod_auth_mellon is configured to only let through authenticated users (with the require valid-user directive), adding special HTTP headers that are normally used to start the special SAML ECP (non-browser based) can be used to bypass authentication.", title: "Vulnerability description", }, { category: "summary", text: "mod_auth_mellon: authentication bypass in ECP flow", title: "Vulnerability summary", }, { category: "other", text: "This issue did not affect the versions of mod_auth_mellon as shipped with Red Hat Enterprise Linux 6 as they did not include support for ECP.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.src", "6Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", "6Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.src", "6Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", "6Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-3878", }, { category: "external", summary: "RHBZ#1691126", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1691126", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-3878", url: "https://www.cve.org/CVERecord?id=CVE-2019-3878", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-3878", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-3878", }, { category: "external", summary: "https://github.com/Uninett/mod_auth_mellon/pull/196", url: "https://github.com/Uninett/mod_auth_mellon/pull/196", }, ], release_date: "2018-05-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-04-11T11:59:20+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "6Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.src", "6Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", "6Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.src", "6Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", "6Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:0746", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", version: "3.0", }, products: [ "6Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.src", "6Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", "6Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.src", "6Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", "6Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "mod_auth_mellon: authentication bypass in ECP flow", }, ], }
rhsa-2019:1296
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Red Hat JBoss Core Services Pack Apache Server 2.4.29 Service Pack 2 zip release for RHEL 6 and RHEL 7 is available.\n\nRed Hat Product Security has rated this release as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.\n\nThis release adds the new Apache HTTP Server 2.4.29 Service Pack 2 packages that are part of the JBoss Core Services offering. It serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.29 SP1, and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes, enhancements and component upgrades included in this release.\n\nSecurity Fix(es):\n\n* openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang (CVE-2018-0732)\n\n* openssl: ROHNP - Key Extraction Side Channel in Multiple Crypto Libraries (CVE-2018-0495)\n\n* httpd: privilege escalation from modules scripts (CVE-2019-0211)\n\nDetails around this issue, including information about the CVE, severity of the issue, and CVSS scores can be found on the CVE pages listed in the References section below.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2019:1296", url: "https://access.redhat.com/errata/RHSA-2019:1296", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp&downloadType=securityPatches&version=2.4.29", url: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp&downloadType=securityPatches&version=2.4.29", }, { category: "external", summary: "1591100", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1591100", }, { category: "external", summary: "1591163", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1591163", }, { category: "external", summary: "1694980", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1694980", }, { category: "external", summary: "JBCS-620", url: "https://issues.redhat.com/browse/JBCS-620", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1296.json", }, ], title: "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 SP2 security update", tracking: { current_release_date: "2024-11-22T12:07:55+00:00", generator: { date: "2024-11-22T12:07:55+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2019:1296", initial_release_date: "2019-05-30T14:48:20+00:00", revision_history: [ { date: "2019-05-30T14:48:20+00:00", number: "1", summary: "Initial version", }, { date: "2019-05-30T14:48:20+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T12:07:55+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "JBoss Core Services Apache HTTP Server 2.4.29 SP2", product: { name: "JBoss Core Services Apache HTTP Server 2.4.29 SP2", product_id: "JBoss Core Services Apache HTTP Server 2.4.29 SP2", product_identification_helper: { cpe: "cpe:/a:redhat:jboss_core_services:1", }, }, }, ], category: "product_family", name: "Red Hat JBoss Core Services", }, ], category: "vendor", name: "Red Hat", }, ], }, vulnerabilities: [ { cve: "CVE-2018-0495", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2018-06-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1591163", }, ], notes: [ { category: "description", text: "Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.", title: "Vulnerability description", }, { category: "summary", text: "ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries", title: "Vulnerability summary", }, { category: "other", text: "Since the 5.8.3 release, Red Hat CloudForms no longer uses libtomcrypt.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-0495", }, { category: "external", summary: "RHBZ#1591163", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1591163", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-0495", url: "https://www.cve.org/CVERecord?id=CVE-2018-0495", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-0495", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-0495", }, { category: "external", summary: "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/", url: "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/", }, ], release_date: "2018-06-13T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-05-30T14:48:20+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1296", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.1, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries", }, { cve: "CVE-2018-0732", cwe: { id: "CWE-325", name: "Missing Cryptographic Step", }, discovery_date: "2018-06-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1591100", }, ], notes: [ { category: "description", text: "During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).", title: "Vulnerability description", }, { category: "summary", text: "openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-0732", }, { category: "external", summary: "RHBZ#1591100", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1591100", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-0732", url: "https://www.cve.org/CVERecord?id=CVE-2018-0732", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-0732", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-0732", }, { category: "external", summary: "https://www.openssl.org/news/secadv/20180612.txt", url: "https://www.openssl.org/news/secadv/20180612.txt", }, ], release_date: "2018-06-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-05-30T14:48:20+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1296", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang", }, { cve: "CVE-2019-0211", cwe: { id: "CWE-250", name: "Execution with Unnecessary Privileges", }, discovery_date: "2019-04-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1694980", }, ], notes: [ { category: "description", text: "A flaw was found in Apache where code executing in a less-privileged child process or thread could execute arbitrary code with the privilege of the parent process (usually root). An attacker having access to run arbitrary scripts on the web server (PHP, CGI etc) could use this flaw to run code on the web server with root privileges.", title: "Vulnerability description", }, { category: "summary", text: "httpd: privilege escalation from modules scripts", title: "Vulnerability summary", }, { category: "other", text: "This flaw is exploitable in httpd if it is configured to allow an untrusted user to upload and execute arbitrary scripts. Due to the nature of the flaw, the uploaded script would not run as a restricted privileged user, but rather it runs as root allowing for privilege escalation from the restricted user to root on the web server. \n\nDepending on the configuration of the server, you would need local (AV:L) privileges to place the script or network (AV:N) privileges if the server ran an application that permitted uploading scripts directly. The latter scenario is not common for unauthenticated users. Once the attacker can place the script somewhere in the web root where it can be easily exploited (AC:L). This type of setup is more common in shared hosted environments (PR:L) and would allow an attacker with access to a site on the shared hosted to impact the confidentiality, integrity, and availability (CIA:H) with no interaction (UI:N). Due to the elevated privileges obtained, there is an impact to the system beyond the web server itself (S:C).", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-0211", }, { category: "external", summary: "RHBZ#1694980", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1694980", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-0211", url: "https://www.cve.org/CVERecord?id=CVE-2019-0211", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-0211", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-0211", }, { category: "external", summary: "http://www.apache.org/dist/httpd/CHANGES_2.4", url: "http://www.apache.org/dist/httpd/CHANGES_2.4", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211", }, { category: "external", summary: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", url: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, ], release_date: "2019-04-01T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-05-30T14:48:20+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1296", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "exploit_status", date: "2021-11-03T00:00:00+00:00", details: "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, { category: "impact", details: "Important", }, ], title: "httpd: privilege escalation from modules scripts", }, ], }
RHSA-2019:1543
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Red Hat JBoss Core Services Pack Apache Server 2.4.29 Service Pack 2 packages for Microsoft Windows and Oracle Solaris are now available.\n\nRed Hat Product Security has rated this release as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "This release adds the new Apache HTTP Server 2.4.29 Service Pack 2 packages that are part of the JBoss Core Services offering.\n\nThis release serves as a replacement for Red Hat JBoss Core Services\nApache HTTP Server 2.4.29 SP1, and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes, enhancements and component upgrades included in this release.\n\nSecurity Fix(es):\n\n* openssl: ROHNP - Key Extraction Side Channel in Multiple Crypto Libraries (CVE-2018-0495)\n\n* openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang (CVE-2018-0732)\n\n* libxml2: NULL pointer dereference in xpath.c:xmlXPathCompOpEval() can allow attackers to cause a denial of service (CVE-2018-14404)\n\n* curl: Out-of-bounds read in code handling HTTP/2 trailers (CVE-2018-1000005)\n\n* curl: HTTP authentication leak in redirects (CVE-2018-1000007)\n\n* curl: FTP path trickery leads to NIL byte out of bounds write (CVE-2018-1000120)\n\n* curl: RTSP RTP buffer over-read (CVE-2018-1000122)\n\n* httpd: privilege escalation from modules scripts (CVE-2019-0211)\n\nDetails around these issues, including information about CVEs, severity of the issues, and CVSS scores can be found on the CVE pages listed in the References section below.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2019:1543", url: "https://access.redhat.com/errata/RHSA-2019:1543", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp&downloadType=securityPatches&version=2.4.29", url: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp&downloadType=securityPatches&version=2.4.29", }, { category: "external", summary: "1536013", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1536013", }, { category: "external", summary: "1537125", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1537125", }, { category: "external", summary: "1552628", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1552628", }, { category: "external", summary: "1553398", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1553398", }, { category: "external", summary: "1591100", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1591100", }, { category: "external", summary: "1591163", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1591163", }, { category: "external", summary: "1595985", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1595985", }, { category: "external", summary: "1694980", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1694980", }, { category: "external", summary: "JBCS-722", url: "https://issues.redhat.com/browse/JBCS-722", }, { category: "external", summary: "JBCS-750", url: "https://issues.redhat.com/browse/JBCS-750", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1543.json", }, ], title: "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 SP2 security update", tracking: { current_release_date: "2025-04-17T15:03:54+00:00", generator: { date: "2025-04-17T15:03:54+00:00", engine: { name: "Red Hat SDEngine", version: "4.4.2", }, }, id: "RHSA-2019:1543", initial_release_date: "2019-06-18T19:08:49+00:00", revision_history: [ { date: "2019-06-18T19:08:49+00:00", number: "1", summary: "Initial version", }, { date: "2019-06-18T19:08:49+00:00", number: "2", summary: "Last updated version", }, { date: "2025-04-17T15:03:54+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "JBoss Core Services Apache HTTP Server 2.4.29 SP2", product: { name: "JBoss Core Services Apache HTTP Server 2.4.29 SP2", product_id: "JBoss Core Services Apache HTTP Server 2.4.29 SP2", product_identification_helper: { cpe: "cpe:/a:redhat:jboss_core_services:1", }, }, }, ], category: "product_family", name: "Red Hat JBoss Core Services", }, ], category: "vendor", name: "Red Hat", }, ], }, vulnerabilities: [ { cve: "CVE-2018-0495", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2018-06-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1591163", }, ], notes: [ { category: "description", text: "Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.", title: "Vulnerability description", }, { category: "summary", text: "ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries", title: "Vulnerability summary", }, { category: "other", text: "Since the 5.8.3 release, Red Hat CloudForms no longer uses libtomcrypt.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-0495", }, { category: "external", summary: "RHBZ#1591163", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1591163", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-0495", url: "https://www.cve.org/CVERecord?id=CVE-2018-0495", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-0495", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-0495", }, { category: "external", summary: "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/", url: "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/", }, ], release_date: "2018-06-13T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.1, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries", }, { cve: "CVE-2018-0732", cwe: { id: "CWE-325", name: "Missing Cryptographic Step", }, discovery_date: "2018-06-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1591100", }, ], notes: [ { category: "description", text: "During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).", title: "Vulnerability description", }, { category: "summary", text: "openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-0732", }, { category: "external", summary: "RHBZ#1591100", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1591100", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-0732", url: "https://www.cve.org/CVERecord?id=CVE-2018-0732", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-0732", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-0732", }, { category: "external", summary: "https://www.openssl.org/news/secadv/20180612.txt", url: "https://www.openssl.org/news/secadv/20180612.txt", }, ], release_date: "2018-06-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang", }, { cve: "CVE-2018-14404", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, discovery_date: "2018-06-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1595985", }, ], notes: [ { category: "description", text: "A null pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 when parsing invalid XPath expression. Applications processing untrusted XSL format inputs with the use of libxml2 library may be vulnerable to denial of service attack due to crash of the application.", title: "Vulnerability description", }, { category: "summary", text: "libxml2: NULL pointer dereference in xmlXPathCompOpEval() function in xpath.c", title: "Vulnerability summary", }, { category: "other", text: "This issue affects the versions of libxml2 as shipped with Red Hat Enterprise Linux 5. Red Hat Enterprise Linux 5 is now in Extended Life Phase of the support and maintenance life cycle. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of libxml2 as shipped with Red Hat Enterprise Linux 6. Red Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Moderate, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of libxml2 as shipped with Red Hat Enterprise Linux 7. Red Hat Product Security has rated this issue as having a security impact of Moderate. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-14404", }, { category: "external", summary: "RHBZ#1595985", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1595985", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-14404", url: "https://www.cve.org/CVERecord?id=CVE-2018-14404", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-14404", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-14404", }, ], release_date: "2018-06-18T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "libxml2: NULL pointer dereference in xmlXPathCompOpEval() function in xpath.c", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "Harry Sintonen", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-16839", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2018-10-22T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1642201", }, ], notes: [ { category: "description", text: "Curl versions 7.33.0 through 7.61.1 are vulnerable to a buffer overrun in the SASL authentication code that may lead to denial of service.", title: "Vulnerability description", }, { category: "summary", text: "curl: Integer overflow leading to heap-based buffer overflow in Curl_sasl_create_plain_message()", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-16839", }, { category: "external", summary: "RHBZ#1642201", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1642201", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-16839", url: "https://www.cve.org/CVERecord?id=CVE-2018-16839", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-16839", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-16839", }, { category: "external", summary: "https://curl.haxx.se/docs/CVE-2018-16839.html", url: "https://curl.haxx.se/docs/CVE-2018-16839.html", }, ], release_date: "2018-10-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "curl: Integer overflow leading to heap-based buffer overflow in Curl_sasl_create_plain_message()", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "Brian Carpenter", ], organization: "Geeknik Labs", summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-16840", cwe: { id: "CWE-416", name: "Use After Free", }, discovery_date: "2018-10-22T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1642203", }, ], notes: [ { category: "description", text: "A heap use-after-free flaw was found in curl versions from 7.59.0 through 7.61.1 in the code related to closing an easy handle. When closing and cleaning up an 'easy' handle in the `Curl_close()` function, the library code first frees a struct (without nulling the pointer) and might then subsequently erroneously write to a struct field within that already freed struct.", title: "Vulnerability description", }, { category: "summary", text: "curl: Use-after-free when closing \"easy\" handle in Curl_close()", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-16840", }, { category: "external", summary: "RHBZ#1642203", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1642203", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-16840", url: "https://www.cve.org/CVERecord?id=CVE-2018-16840", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-16840", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-16840", }, { category: "external", summary: "https://curl.haxx.se/docs/CVE-2018-16840.html", url: "https://curl.haxx.se/docs/CVE-2018-16840.html", }, ], release_date: "2018-10-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "curl: Use-after-free when closing \"easy\" handle in Curl_close()", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "Brian Carpenter", ], organization: "Geeknik Labs", summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-16842", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, discovery_date: "2018-10-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1644124", }, ], notes: [ { category: "description", text: "Curl versions 7.14.1 through 7.61.1 are vulnerable to a heap-based buffer over-read in the tool_msgs.c:voutf() function that may result in information exposure and denial of service.", title: "Vulnerability description", }, { category: "summary", text: "curl: Heap-based buffer over-read in the curl tool warning formatting", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-16842", }, { category: "external", summary: "RHBZ#1644124", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1644124", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-16842", url: "https://www.cve.org/CVERecord?id=CVE-2018-16842", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-16842", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-16842", }, { category: "external", summary: "https://curl.haxx.se/docs/CVE-2018-16842.html", url: "https://curl.haxx.se/docs/CVE-2018-16842.html", }, ], release_date: "2018-10-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 3.6, baseSeverity: "LOW", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "curl: Heap-based buffer over-read in the curl tool warning formatting", }, { acknowledgments: [ { names: [ "Daniel Stenberg", ], organization: "the Curl project", }, { names: [ "Wenxiang Qian", ], organization: "Tencent Blade Team", summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-16890", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, discovery_date: "2019-01-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1670252", }, ], notes: [ { category: "description", text: "An out-of-bounds read flaw was found in the way curl handled NTLMv2 type-2 headers. When connecting to a remote malicious server which uses NTLM authentication, the flaw could cause curl to crash.", title: "Vulnerability description", }, { category: "summary", text: "curl: NTLM type-2 heap out-of-bounds buffer read", title: "Vulnerability summary", }, { category: "other", text: "The versions of curl package shipped with Red Hat Enterprise Linux 5, 6, and 7 do not support NTLMv2 type-2 headers, hence they are not affected by this flaw.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-16890", }, { category: "external", summary: "RHBZ#1670252", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1670252", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-16890", url: "https://www.cve.org/CVERecord?id=CVE-2018-16890", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-16890", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-16890", }, { category: "external", summary: "https://curl.haxx.se/docs/CVE-2018-16890.html", url: "https://curl.haxx.se/docs/CVE-2018-16890.html", }, ], release_date: "2019-02-06T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, { category: "workaround", details: "Turn off NTLM authentication.", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "curl: NTLM type-2 heap out-of-bounds buffer read", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "Zhouyihai Ding", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-1000005", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, discovery_date: "2018-01-17T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1536013", }, ], notes: [ { category: "description", text: "libcurl 7.49.0 to and including 7.57.0 contains an out bounds read in code handling HTTP/2 trailers. It was reported (https://github.com/curl/curl/pull/2231) that reading an HTTP/2 trailer could mess up future trailers since the stored size was one byte less than required. The problem is that the code that creates HTTP/1-like headers from the HTTP/2 trailer data once appended a string like `:` to the target buffer, while this was recently changed to `: ` (a space was added after the colon) but the following math wasn't updated correspondingly. When accessed, the data is read out of bounds and causes either a crash or that the (too large) data gets passed to client write. This could lead to a denial-of-service situation or an information disclosure if someone has a service that echoes back or uses the trailers for something.", title: "Vulnerability description", }, { category: "summary", text: "curl: Out-of-bounds read in code handling HTTP/2 trailers", title: "Vulnerability summary", }, { category: "other", text: "This flaw was introduced in curl-7.49.0. Therefore the versions of curl shipped with Red Hat Enterprise Linux 5, 6 and 7 and Red Hat Ceph Storage 2 are not affected by this flaw.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1000005", }, { category: "external", summary: "RHBZ#1536013", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1536013", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1000005", url: "https://www.cve.org/CVERecord?id=CVE-2018-1000005", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000005", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000005", }, { category: "external", summary: "https://curl.haxx.se/docs/adv_2018-824a.html", url: "https://curl.haxx.se/docs/adv_2018-824a.html", }, ], release_date: "2018-01-24T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "curl: Out-of-bounds read in code handling HTTP/2 trailers", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "Craig de Stigter", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-1000007", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2018-01-19T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1537125", }, ], notes: [ { category: "description", text: "It was found that curl and libcurl might send their Authentication header to a third party HTTP server upon receiving an HTTP REDIRECT reply. This could leak authentication token to external entities.", title: "Vulnerability description", }, { category: "summary", text: "curl: HTTP authentication leak in redirects", title: "Vulnerability summary", }, { category: "other", text: "This issue affects the versions of curl as shipped with Red Hat Enterprise Linux 5, 6, and 7, as well as the versions of httpd24-curl as shipped with Red Hat Software Collections. Red Hat Product Security has rated this issue as having Moderate security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1000007", }, { category: "external", summary: "RHBZ#1537125", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1537125", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1000007", url: "https://www.cve.org/CVERecord?id=CVE-2018-1000007", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000007", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000007", }, { category: "external", summary: "https://curl.haxx.se/docs/adv_2018-b3bf.html", url: "https://curl.haxx.se/docs/adv_2018-b3bf.html", }, ], release_date: "2018-01-24T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, { category: "workaround", details: "By default, curl and libcurl will not follow redirect requests.\nThis flaw happens only when curl or libcurl are explicitly requested to follow redirects (option --location in curl, and CURLOPT_FOLLOWLOCATION in libcurl).\nTo mitigate this, it is possible to prevent the automated following of redirects, replacing it by manual redirects (and remove the authentication header), for example.", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "curl: HTTP authentication leak in redirects", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "Duy Phan Thanh", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-1000120", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2018-03-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1552628", }, ], notes: [ { category: "description", text: "It was found that libcurl did not safely parse FTP URLs when using the CURLOPT_FTP_FILEMETHOD method. An attacker, able to provide a specially crafted FTP URL to an application using libcurl, could write a NULL byte at an arbitrary location, resulting in a crash or an unspecified behavior.", title: "Vulnerability description", }, { category: "summary", text: "curl: FTP path trickery leads to NIL byte out of bounds write", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1000120", }, { category: "external", summary: "RHBZ#1552628", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1552628", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1000120", url: "https://www.cve.org/CVERecord?id=CVE-2018-1000120", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000120", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000120", }, { category: "external", summary: "https://curl.haxx.se/docs/adv_2018-9cd6.html", url: "https://curl.haxx.se/docs/adv_2018-9cd6.html", }, ], release_date: "2018-03-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, { category: "workaround", details: "Preventing application from using non-default CURLOPT_FTP_FILEMETHOD will avoid triggering the vulnerable code.", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "curl: FTP path trickery leads to NIL byte out of bounds write", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "Dario Weisser", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-1000121", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, discovery_date: "2018-03-07T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1552631", }, ], notes: [ { category: "description", text: "A NULL pointer dereference flaw was found in the way libcurl checks values returned by the openldap ldap_get_attribute_ber() function. A malicious LDAP server could use this flaw to crash a libcurl client application via a specially crafted LDAP reply.", title: "Vulnerability description", }, { category: "summary", text: "curl: LDAP NULL pointer dereference", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1000121", }, { category: "external", summary: "RHBZ#1552631", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1552631", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1000121", url: "https://www.cve.org/CVERecord?id=CVE-2018-1000121", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000121", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000121", }, { category: "external", summary: "https://curl.haxx.se/docs/adv_2018-97a2.html", url: "https://curl.haxx.se/docs/adv_2018-97a2.html", }, ], release_date: "2018-03-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "curl: LDAP NULL pointer dereference", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "Max Dymond", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2018-1000122", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2018-03-08T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1553398", }, ], notes: [ { category: "description", text: "A buffer over-read exists in curl 7.20.0 to and including curl 7.58.0 in the RTSP+RTP handling code that allows an attacker to cause a denial of service or information leakage", title: "Vulnerability description", }, { category: "summary", text: "curl: RTSP RTP buffer over-read", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1000122", }, { category: "external", summary: "RHBZ#1553398", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1553398", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1000122", url: "https://www.cve.org/CVERecord?id=CVE-2018-1000122", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000122", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000122", }, { category: "external", summary: "https://curl.haxx.se/docs/adv_2018-b047.html", url: "https://curl.haxx.se/docs/adv_2018-b047.html", }, ], release_date: "2018-03-14T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "curl: RTSP RTP buffer over-read", }, { cve: "CVE-2019-0211", cwe: { id: "CWE-250", name: "Execution with Unnecessary Privileges", }, discovery_date: "2019-04-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1694980", }, ], notes: [ { category: "description", text: "A flaw was found in Apache where code executing in a less-privileged child process or thread could execute arbitrary code with the privilege of the parent process (usually root). An attacker having access to run arbitrary scripts on the web server (PHP, CGI etc) could use this flaw to run code on the web server with root privileges.", title: "Vulnerability description", }, { category: "summary", text: "httpd: privilege escalation from modules scripts", title: "Vulnerability summary", }, { category: "other", text: "This flaw is exploitable in httpd if it is configured to allow an untrusted user to upload and execute arbitrary scripts. Due to the nature of the flaw, the uploaded script would not run as a restricted privileged user, but rather it runs as root allowing for privilege escalation from the restricted user to root on the web server. \n\nDepending on the configuration of the server, you would need local (AV:L) privileges to place the script or network (AV:N) privileges if the server ran an application that permitted uploading scripts directly. The latter scenario is not common for unauthenticated users. Once the attacker can place the script somewhere in the web root where it can be easily exploited (AC:L). This type of setup is more common in shared hosted environments (PR:L) and would allow an attacker with access to a site on the shared hosted to impact the confidentiality, integrity, and availability (CIA:H) with no interaction (UI:N). Due to the elevated privileges obtained, there is an impact to the system beyond the web server itself (S:C).", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-0211", }, { category: "external", summary: "RHBZ#1694980", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1694980", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-0211", url: "https://www.cve.org/CVERecord?id=CVE-2019-0211", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-0211", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-0211", }, { category: "external", summary: "http://www.apache.org/dist/httpd/CHANGES_2.4", url: "http://www.apache.org/dist/httpd/CHANGES_2.4", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211", }, { category: "external", summary: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", url: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, ], release_date: "2019-04-01T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "exploit_status", date: "2021-11-03T00:00:00+00:00", details: "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, { category: "impact", details: "Important", }, ], title: "httpd: privilege escalation from modules scripts", }, { acknowledgments: [ { names: [ "Daniel Stenberg", ], organization: "the Curl project", }, { names: [ "Wenxiang Qian", ], organization: "Tencent Blade Team", summary: "Acknowledged by upstream.", }, ], cve: "CVE-2019-3822", cwe: { id: "CWE-121", name: "Stack-based Buffer Overflow", }, discovery_date: "2019-01-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1670254", }, ], notes: [ { category: "description", text: "A stack-based buffer overflow was found in the way curl handled NTLMv2 type-3 headers. When connecting to a remote malicious server which uses NTLM authentication, the flaw could cause curl to crash.", title: "Vulnerability description", }, { category: "summary", text: "curl: NTLMv2 type-3 header stack buffer overflow", title: "Vulnerability summary", }, { category: "other", text: "The versions of curl package shipped with Red Hat Enterprise Linux 5, 6, and 7 do not support NTLMv2 type-3 headers, hence they are not affected by this flaw.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-3822", }, { category: "external", summary: "RHBZ#1670254", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1670254", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-3822", url: "https://www.cve.org/CVERecord?id=CVE-2019-3822", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-3822", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-3822", }, { category: "external", summary: "https://curl.haxx.se/docs/CVE-2019-3822.html", url: "https://curl.haxx.se/docs/CVE-2019-3822.html", }, ], release_date: "2019-02-06T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, { category: "workaround", details: "Turn off NTLM authentication.", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "curl: NTLMv2 type-3 header stack buffer overflow", }, { acknowledgments: [ { names: [ "Daniel Stenberg", ], organization: "the Curl project", }, { names: [ "Brian Carpenter", ], organization: "Geeknik Labs", summary: "Acknowledged by upstream.", }, ], cve: "CVE-2019-3823", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, discovery_date: "2019-01-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1670256", }, ], notes: [ { category: "description", text: "An out-of-bounds read flaw was found in the way curl handled certain SMTP responses. A remote attacker could use this flaw to crash curl.", title: "Vulnerability description", }, { category: "summary", text: "curl: SMTP end-of-response out-of-bounds read", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-3823", }, { category: "external", summary: "RHBZ#1670256", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1670256", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-3823", url: "https://www.cve.org/CVERecord?id=CVE-2019-3823", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-3823", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-3823", }, { category: "external", summary: "https://curl.haxx.se/docs/CVE-2019-3823.html", url: "https://curl.haxx.se/docs/CVE-2019-3823.html", }, ], release_date: "2019-02-06T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, { category: "workaround", details: "Do not use SMTP authentication with curl", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "curl: SMTP end-of-response out-of-bounds read", }, { acknowledgments: [ { names: [ "the Curl project", ], }, { names: [ "l00p3r", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2019-5436", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2019-05-15T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1710620", }, ], notes: [ { category: "description", text: "A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7.19.4 through 7.64.1.", title: "Vulnerability description", }, { category: "summary", text: "curl: TFTP receive heap buffer overflow in tftp_receive_packet() function", title: "Vulnerability summary", }, { category: "other", text: "This flaw exists if the user selects to use a \"blksize\" of 504 or smaller (default is 512). The smaller size that is used, the larger the possible overflow becomes.\nUsers choosing a smaller size than default should be rare as the primary use case for changing the size is to make it larger. It is rare for users to use TFTP across the Internet. It is most commonly used within local networks.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-5436", }, { category: "external", summary: "RHBZ#1710620", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1710620", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-5436", url: "https://www.cve.org/CVERecord?id=CVE-2019-5436", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-5436", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-5436", }, { category: "external", summary: "https://curl.haxx.se/docs/CVE-2019-5436.html", url: "https://curl.haxx.se/docs/CVE-2019-5436.html", }, ], release_date: "2019-05-22T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-06-18T19:08:49+00:00", details: "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", product_ids: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1543", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "JBoss Core Services Apache HTTP Server 2.4.29 SP2", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "curl: TFTP receive heap buffer overflow in tftp_receive_packet() function", }, ], }
RHSA-2019:0980
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: privilege escalation from modules scripts (CVE-2019-0211)\n\n* httpd: mod_ssl: access control bypass when using per-location client certification authentication (CVE-2019-0215)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2019:0980", url: "https://access.redhat.com/errata/RHSA-2019:0980", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "1694980", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1694980", }, { category: "external", summary: "1695025", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1695025", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_0980.json", }, ], title: "Red Hat Security Advisory: httpd:2.4 security update", tracking: { current_release_date: "2024-11-22T12:56:59+00:00", generator: { date: "2024-11-22T12:56:59+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2019:0980", initial_release_date: "2019-05-07T04:19:52+00:00", revision_history: [ { date: "2019-05-07T04:19:52+00:00", number: "1", summary: "Initial version", }, { date: "2019-05-07T04:19:52+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T12:56:59+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AppStream (v. 8)", product: { name: "Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z", product_identification_helper: { cpe: "cpe:/a:redhat:enterprise_linux:8::appstream", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "httpd:2.4:8000020190405071959:55190bc5", product: { name: "httpd:2.4:8000020190405071959:55190bc5", product_id: "httpd:2.4:8000020190405071959:55190bc5", product_identification_helper: { purl: "pkg:rpmmod/redhat/httpd@2.4:8000020190405071959:55190bc5", }, }, }, { category: "product_version", name: "httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", product: { name: "httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", product_id: "httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-filesystem@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=noarch", }, }, }, { category: "product_version", name: "httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", product: { name: "httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", product_id: "httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-manual@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product: { name: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_id: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x", }, }, }, { category: "product_version", name: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product: { name: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_id: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x", }, }, }, { category: "product_version", name: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product: { name: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_id: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debugsource@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x", }, }, }, { category: "product_version", name: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product: { name: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_id: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-devel@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x", }, }, }, { category: "product_version", name: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product: { name: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_id: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x", }, }, }, { category: "product_version", name: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product: { name: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_id: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x", }, }, }, { category: "product_version", name: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", product: { name: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", product_id: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x", }, }, }, { category: "product_version", name: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", product: { name: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", product_id: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x", }, }, }, { category: "product_version", name: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", product: { name: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", product_id: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x", }, }, }, { category: "product_version", name: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product: { name: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_id: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x", }, }, }, { category: "product_version", name: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product: { name: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_id: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x", }, }, }, { category: "product_version", name: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product: { name: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_id: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x", }, }, }, { category: "product_version", name: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product: { name: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_id: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x", }, }, }, { category: "product_version", name: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product: { name: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_id: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product: { name: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_id: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product: { name: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_id: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x", }, }, }, { category: "product_version", name: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product: { name: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_id: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x", }, }, }, { category: "product_version", name: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product: { name: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_id: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product: { name: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_id: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x&epoch=1", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", product: { name: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", product_id: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", product_identification_helper: { purl: "pkg:rpm/redhat/httpd@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=src", }, }, }, { category: "product_version", name: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", product: { name: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", product_id: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product: { name: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_id: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64", }, }, }, { category: "product_version", name: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product: { name: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_id: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64", }, }, }, { category: "product_version", name: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product: { name: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_id: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debugsource@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64", }, }, }, { category: "product_version", name: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product: { name: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_id: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-devel@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64", }, }, }, { category: "product_version", name: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product: { name: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_id: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64", }, }, }, { category: "product_version", name: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product: { name: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_id: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64", }, }, }, { category: "product_version", name: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", product: { name: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", product_id: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64", }, }, }, { category: "product_version", name: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", product: { name: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", product_id: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64", }, }, }, { category: "product_version", name: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", product: { name: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", product_id: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64", }, }, }, { category: "product_version", name: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product: { name: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_id: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64", }, }, }, { category: "product_version", name: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product: { name: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_id: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64", }, }, }, { category: "product_version", name: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product: { name: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_id: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64", }, }, }, { category: "product_version", name: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product: { name: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_id: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64", }, }, }, { category: "product_version", name: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product: { name: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_id: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product: { name: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_id: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product: { name: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_id: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64", }, }, }, { category: "product_version", name: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product: { name: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_id: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64", }, }, }, { category: "product_version", name: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product: { name: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_id: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product: { name: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_id: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64&epoch=1", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product: { name: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_id: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product: { name: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_id: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product: { name: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_id: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debugsource@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product: { name: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_id: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-devel@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product: { name: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_id: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product: { name: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_id: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", product: { name: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", product_id: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", product: { name: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", product_id: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", product: { name: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", product_id: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product: { name: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_id: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product: { name: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_id: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product: { name: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_id: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product: { name: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_id: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product: { name: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_id: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product: { name: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_id: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product: { name: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_id: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product: { name: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_id: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product: { name: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_id: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product: { name: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_id: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le&epoch=1", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product: { name: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_id: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64", }, }, }, { category: "product_version", name: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product: { name: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_id: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64", }, }, }, { category: "product_version", name: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product: { name: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_id: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debugsource@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64", }, }, }, { category: "product_version", name: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product: { name: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_id: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-devel@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64", }, }, }, { category: "product_version", name: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product: { name: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_id: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64", }, }, }, { category: "product_version", name: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product: { name: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_id: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64", }, }, }, { category: "product_version", name: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", product: { name: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", product_id: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64", }, }, }, { category: "product_version", name: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", product: { name: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", product_id: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64", }, }, }, { category: "product_version", name: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", product: { name: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", product_id: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64", }, }, }, { category: "product_version", name: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product: { name: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_id: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64", }, }, }, { category: "product_version", name: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product: { name: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_id: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64", }, }, }, { category: "product_version", name: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product: { name: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_id: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64", }, }, }, { category: "product_version", name: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product: { name: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_id: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64", }, }, }, { category: "product_version", name: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product: { name: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_id: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product: { name: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_id: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product: { name: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_id: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64", }, }, }, { category: "product_version", name: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product: { name: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_id: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64", }, }, }, { category: "product_version", name: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product: { name: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_id: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product: { name: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_id: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64&epoch=1", }, }, }, ], category: "architecture", name: "x86_64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, product_reference: "httpd:2.4:8000020190405071959:55190bc5", relates_to_product_reference: "AppStream-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", }, product_reference: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", }, product_reference: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", }, product_reference: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", }, product_reference: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", }, product_reference: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", }, product_reference: "httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", }, product_reference: "httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", }, product_reference: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", }, product_reference: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", }, product_reference: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", }, product_reference: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", }, product_reference: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", }, product_reference: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", }, product_reference: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", }, product_reference: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", }, product_reference: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", }, product_reference: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", }, product_reference: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", }, product_reference: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", }, product_reference: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", }, product_reference: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", }, product_reference: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", }, product_reference: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, ], }, vulnerabilities: [ { cve: "CVE-2019-0211", cwe: { id: "CWE-250", name: "Execution with Unnecessary Privileges", }, discovery_date: "2019-04-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1694980", }, ], notes: [ { category: "description", text: "A flaw was found in Apache where code executing in a less-privileged child process or thread could execute arbitrary code with the privilege of the parent process (usually root). An attacker having access to run arbitrary scripts on the web server (PHP, CGI etc) could use this flaw to run code on the web server with root privileges.", title: "Vulnerability description", }, { category: "summary", text: "httpd: privilege escalation from modules scripts", title: "Vulnerability summary", }, { category: "other", text: "This flaw is exploitable in httpd if it is configured to allow an untrusted user to upload and execute arbitrary scripts. Due to the nature of the flaw, the uploaded script would not run as a restricted privileged user, but rather it runs as root allowing for privilege escalation from the restricted user to root on the web server. \n\nDepending on the configuration of the server, you would need local (AV:L) privileges to place the script or network (AV:N) privileges if the server ran an application that permitted uploading scripts directly. The latter scenario is not common for unauthenticated users. Once the attacker can place the script somewhere in the web root where it can be easily exploited (AC:L). This type of setup is more common in shared hosted environments (PR:L) and would allow an attacker with access to a site on the shared hosted to impact the confidentiality, integrity, and availability (CIA:H) with no interaction (UI:N). Due to the elevated privileges obtained, there is an impact to the system beyond the web server itself (S:C).", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-0211", }, { category: "external", summary: "RHBZ#1694980", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1694980", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-0211", url: "https://www.cve.org/CVERecord?id=CVE-2019-0211", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-0211", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-0211", }, { category: "external", summary: "http://www.apache.org/dist/httpd/CHANGES_2.4", url: "http://www.apache.org/dist/httpd/CHANGES_2.4", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211", }, { category: "external", summary: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", url: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, ], release_date: "2019-04-01T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-05-07T04:19:52+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:0980", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", ], }, ], threats: [ { category: "exploit_status", date: "2021-11-03T00:00:00+00:00", details: "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, { category: "impact", details: "Important", }, ], title: "httpd: privilege escalation from modules scripts", }, { cve: "CVE-2019-0215", cwe: { id: "CWE-284", name: "Improper Access Control", }, discovery_date: "2019-04-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1695025", }, ], notes: [ { category: "description", text: "A flaw was found in Apache HTTP Server 2.4 (releases 2.4.37 and 2.4.38). A bug in mod_ssl, when using per-location client certificate verification with TLSv1.3, allowed a client supporting Post-Handshake Authentication to bypass configured access control restrictions. An attacker could perform various unauthorized actions after bypassing the restrictions. The highest threat from this vulnerability is to data confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_ssl: access control bypass when using per-location client certification authentication", title: "Vulnerability summary", }, { category: "other", text: "This flaw can be exploited for httpd configurations where per-location client certificates are enabled and TLS 1.3 is used. \n\nThe attacker can remotely exploit this httpd flaw (AV:N). However the server had to be configured to use per-location client certificate and the attacker needs to have access to the authenticating client certificate (AC:H). No other significant privileges are required by the attacker (PR:L). The result of the attack is bypass of the configured access control restrictions (CI:H). This however does not affect the system beyond the web server itself (S:U).", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-0215", }, { category: "external", summary: "RHBZ#1695025", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1695025", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-0215", url: "https://www.cve.org/CVERecord?id=CVE-2019-0215", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-0215", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-0215", }, { category: "external", summary: "http://www.apache.org/dist/httpd/CHANGES_2.4", url: "http://www.apache.org/dist/httpd/CHANGES_2.4", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html", url: "https://httpd.apache.org/security/vulnerabilities_24.html", }, ], release_date: "2019-04-01T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-05-07T04:19:52+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:0980", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.8, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", version: "3.0", }, products: [ "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "httpd: mod_ssl: access control bypass when using per-location client certification authentication", }, ], }
rhsa-2019_0746
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for httpd24-httpd and httpd24-mod_auth_mellon is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The Apache HTTP Server is a powerful, efficient, and extensible web server. The httpd24 packages provide a recent stable release of version 2.4 of the Apache HTTP Server, along with the mod_auth_kerb module.\n\nSecurity Fix(es):\n\n* httpd: privilege escalation from modules scripts (CVE-2019-0211)\n\n* mod_auth_mellon: authentication bypass in ECP flow (CVE-2019-3878)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2019:0746", url: "https://access.redhat.com/errata/RHSA-2019:0746", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "1691126", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1691126", }, { category: "external", summary: "1694980", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1694980", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_0746.json", }, ], title: "Red Hat Security Advisory: httpd24-httpd and httpd24-mod_auth_mellon security update", tracking: { current_release_date: "2024-11-15T05:13:02+00:00", generator: { date: "2024-11-15T05:13:02+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2019:0746", initial_release_date: "2019-04-11T11:59:20+00:00", revision_history: [ { date: "2019-04-11T11:59:20+00:00", number: "1", summary: "Initial version", }, { date: "2019-04-11T11:59:20+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-15T05:13:02+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", product: { name: "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-RHSCL-3.2", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_software_collections:3::el6", }, }, }, { category: "product_name", name: "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", product: { name: "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-RHSCL-3.2", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_software_collections:3::el6", }, }, }, { category: "product_name", name: "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product: { name: "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_software_collections:3::el7", }, }, }, { category: "product_name", name: "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product: { name: "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_software_collections:3::el7", }, }, }, { category: "product_name", name: "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product: { name: "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_software_collections:3::el7", }, }, }, { category: "product_name", name: "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product: { name: "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_software_collections:3::el7", }, }, }, { category: "product_name", name: "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product: { name: "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_software_collections:3::el7", }, }, }, { category: "product_name", name: "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product: { name: "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_software_collections:3::el7", }, }, }, ], category: "product_family", name: "Red Hat Software Collections", }, { branches: [ { category: "product_version", name: "httpd24-httpd-0:2.4.34-7.el6.1.x86_64", product: { name: "httpd24-httpd-0:2.4.34-7.el6.1.x86_64", product_id: "httpd24-httpd-0:2.4.34-7.el6.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd@2.4.34-7.el6.1?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", product: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", product_id: "httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.34-7.el6.1?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", product: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", product_id: "httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.34-7.el6.1?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", product: { name: "httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", product_id: "httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_ldap@2.4.34-7.el6.1?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", product: { name: "httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", product_id: "httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_ssl@2.4.34-7.el6.1?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", product: { name: "httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", product_id: "httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_session@2.4.34-7.el6.1?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", product: { name: "httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", product_id: "httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-tools@2.4.34-7.el6.1?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", product: { name: "httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", product_id: "httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-devel@2.4.34-7.el6.1?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", product: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", product_id: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_auth_mellon-debuginfo@0.13.1-2.el7.1?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", product: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", product_id: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_auth_mellon@0.13.1-2.el7.1?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", product: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", product_id: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.34-7.el7.1?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", product: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", product_id: "httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_md@2.4.34-7.el7.1?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", product: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", product_id: "httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-devel@2.4.34-7.el7.1?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", product: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", product_id: "httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_ssl@2.4.34-7.el7.1?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", product: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", product_id: "httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_ldap@2.4.34-7.el7.1?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-httpd-0:2.4.34-7.el7.1.x86_64", product: { name: "httpd24-httpd-0:2.4.34-7.el7.1.x86_64", product_id: "httpd24-httpd-0:2.4.34-7.el7.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd@2.4.34-7.el7.1?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", product: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", product_id: "httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-tools@2.4.34-7.el7.1?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", product: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", product_id: "httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_session@2.4.34-7.el7.1?arch=x86_64", }, }, }, { category: "product_version", name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", product: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", product_id: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.34-7.el7.1?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "httpd24-httpd-0:2.4.34-7.el6.1.src", product: { name: "httpd24-httpd-0:2.4.34-7.el6.1.src", product_id: "httpd24-httpd-0:2.4.34-7.el6.1.src", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd@2.4.34-7.el6.1?arch=src", }, }, }, { category: "product_version", name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", product: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", product_id: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_auth_mellon@0.13.1-2.el7.1?arch=src", }, }, }, { category: "product_version", name: "httpd24-httpd-0:2.4.34-7.el7.1.src", product: { name: "httpd24-httpd-0:2.4.34-7.el7.1.src", product_id: "httpd24-httpd-0:2.4.34-7.el7.1.src", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd@2.4.34-7.el7.1?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", product: { name: "httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", product_id: "httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-manual@2.4.34-7.el6.1?arch=noarch", }, }, }, { category: "product_version", name: "httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", product: { name: "httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", product_id: "httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-manual@2.4.34-7.el7.1?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", product: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", product_id: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_auth_mellon-debuginfo@0.13.1-2.el7.1?arch=aarch64", }, }, }, { category: "product_version", name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", product: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", product_id: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_auth_mellon@0.13.1-2.el7.1?arch=aarch64", }, }, }, { category: "product_version", name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", product: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", product_id: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.34-7.el7.1?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", product: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", product_id: "httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_md@2.4.34-7.el7.1?arch=aarch64", }, }, }, { category: "product_version", name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", product: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", product_id: "httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-devel@2.4.34-7.el7.1?arch=aarch64", }, }, }, { category: "product_version", name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", product: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", product_id: "httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_ssl@2.4.34-7.el7.1?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", product: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", product_id: "httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_ldap@2.4.34-7.el7.1?arch=aarch64", }, }, }, { category: "product_version", name: "httpd24-httpd-0:2.4.34-7.el7.1.aarch64", product: { name: "httpd24-httpd-0:2.4.34-7.el7.1.aarch64", product_id: "httpd24-httpd-0:2.4.34-7.el7.1.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd@2.4.34-7.el7.1?arch=aarch64", }, }, }, { category: "product_version", name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", product: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", product_id: "httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-tools@2.4.34-7.el7.1?arch=aarch64", }, }, }, { category: "product_version", name: "httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", product: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", product_id: "httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_session@2.4.34-7.el7.1?arch=aarch64", }, }, }, { category: "product_version", name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", product: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", product_id: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.34-7.el7.1?arch=aarch64", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", product: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", product_id: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_auth_mellon-debuginfo@0.13.1-2.el7.1?arch=s390x", }, }, }, { category: "product_version", name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", product: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", product_id: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_auth_mellon@0.13.1-2.el7.1?arch=s390x", }, }, }, { category: "product_version", name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", product: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", product_id: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.34-7.el7.1?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "httpd24-mod_md-0:2.4.34-7.el7.1.s390x", product: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.s390x", product_id: "httpd24-mod_md-0:2.4.34-7.el7.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_md@2.4.34-7.el7.1?arch=s390x", }, }, }, { category: "product_version", name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", product: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", product_id: "httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-devel@2.4.34-7.el7.1?arch=s390x", }, }, }, { category: "product_version", name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", product: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", product_id: "httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_ssl@2.4.34-7.el7.1?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", product: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", product_id: "httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_ldap@2.4.34-7.el7.1?arch=s390x", }, }, }, { category: "product_version", name: "httpd24-httpd-0:2.4.34-7.el7.1.s390x", product: { name: "httpd24-httpd-0:2.4.34-7.el7.1.s390x", product_id: "httpd24-httpd-0:2.4.34-7.el7.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd@2.4.34-7.el7.1?arch=s390x", }, }, }, { category: "product_version", name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", product: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", product_id: "httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-tools@2.4.34-7.el7.1?arch=s390x", }, }, }, { category: "product_version", name: "httpd24-mod_session-0:2.4.34-7.el7.1.s390x", product: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.s390x", product_id: "httpd24-mod_session-0:2.4.34-7.el7.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_session@2.4.34-7.el7.1?arch=s390x", }, }, }, { category: "product_version", name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", product: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", product_id: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.34-7.el7.1?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", product: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", product_id: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_auth_mellon-debuginfo@0.13.1-2.el7.1?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", product: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", product_id: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_auth_mellon@0.13.1-2.el7.1?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", product: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", product_id: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.34-7.el7.1?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", product: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", product_id: "httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_md@2.4.34-7.el7.1?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", product: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", product_id: "httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-devel@2.4.34-7.el7.1?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", product: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", product_id: "httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_ssl@2.4.34-7.el7.1?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", product: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", product_id: "httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_ldap@2.4.34-7.el7.1?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", product: { name: "httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", product_id: "httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd@2.4.34-7.el7.1?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", product: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", product_id: "httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-tools@2.4.34-7.el7.1?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", product: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", product_id: "httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-mod_session@2.4.34-7.el7.1?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", product: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", product_id: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.34-7.el7.1?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el6.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.src", }, product_reference: "httpd24-httpd-0:2.4.34-7.el6.1.src", relates_to_product_reference: "6Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.x86_64", }, product_reference: "httpd24-httpd-0:2.4.34-7.el6.1.x86_64", relates_to_product_reference: "6Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", relates_to_product_reference: "6Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", relates_to_product_reference: "6Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", }, product_reference: "httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", relates_to_product_reference: "6Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", relates_to_product_reference: "6Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", relates_to_product_reference: "6Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", relates_to_product_reference: "6Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", relates_to_product_reference: "6Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", relates_to_product_reference: "6Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el6.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.src", }, product_reference: "httpd24-httpd-0:2.4.34-7.el6.1.src", relates_to_product_reference: "6Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.x86_64", }, product_reference: "httpd24-httpd-0:2.4.34-7.el6.1.x86_64", relates_to_product_reference: "6Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", relates_to_product_reference: "6Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", relates_to_product_reference: "6Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", }, product_reference: "httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", relates_to_product_reference: "6Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", relates_to_product_reference: "6Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", relates_to_product_reference: "6Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", relates_to_product_reference: "6Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", relates_to_product_reference: "6Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", relates_to_product_reference: "6Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.src", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", }, product_reference: "httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-Alt-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.src", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", }, product_reference: "httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", product_id: "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.4.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.src", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", }, product_reference: "httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", product_id: "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.5.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.src", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", }, product_reference: "httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", product_id: "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2-7.6.Z", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.src", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", }, product_reference: "httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Server-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.src", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", }, product_reference: "httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", }, product_reference: "httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", }, product_reference: "httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_md-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_session-0:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, { category: "default_component_of", full_product_name: { name: "httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", }, product_reference: "httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", relates_to_product_reference: "7Workstation-RHSCL-3.2", }, ], }, vulnerabilities: [ { cve: "CVE-2019-0211", cwe: { id: "CWE-250", name: "Execution with Unnecessary Privileges", }, discovery_date: "2019-04-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1694980", }, ], notes: [ { category: "description", text: "A flaw was found in Apache where code executing in a less-privileged child process or thread could execute arbitrary code with the privilege of the parent process (usually root). An attacker having access to run arbitrary scripts on the web server (PHP, CGI etc) could use this flaw to run code on the web server with root privileges.", title: "Vulnerability description", }, { category: "summary", text: "httpd: privilege escalation from modules scripts", title: "Vulnerability summary", }, { category: "other", text: "This flaw is exploitable in httpd if it is configured to allow an untrusted user to upload and execute arbitrary scripts. Due to the nature of the flaw, the uploaded script would not run as a restricted privileged user, but rather it runs as root allowing for privilege escalation from the restricted user to root on the web server. \n\nDepending on the configuration of the server, you would need local (AV:L) privileges to place the script or network (AV:N) privileges if the server ran an application that permitted uploading scripts directly. The latter scenario is not common for unauthenticated users. Once the attacker can place the script somewhere in the web root where it can be easily exploited (AC:L). This type of setup is more common in shared hosted environments (PR:L) and would allow an attacker with access to a site on the shared hosted to impact the confidentiality, integrity, and availability (CIA:H) with no interaction (UI:N). Due to the elevated privileges obtained, there is an impact to the system beyond the web server itself (S:C).", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.src", "6Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", "6Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.src", "6Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", "6Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-0211", }, { category: "external", summary: "RHBZ#1694980", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1694980", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-0211", url: "https://www.cve.org/CVERecord?id=CVE-2019-0211", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-0211", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-0211", }, { category: "external", summary: "http://www.apache.org/dist/httpd/CHANGES_2.4", url: "http://www.apache.org/dist/httpd/CHANGES_2.4", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211", }, { category: "external", summary: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", url: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, ], release_date: "2019-04-01T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-04-11T11:59:20+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "6Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.src", "6Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", "6Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.src", "6Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", "6Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:0746", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "6Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.src", "6Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", "6Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.src", "6Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", "6Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", ], }, ], threats: [ { category: "exploit_status", date: "2021-11-03T00:00:00+00:00", details: "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, { category: "impact", details: "Important", }, ], title: "httpd: privilege escalation from modules scripts", }, { cve: "CVE-2019-3878", cwe: { id: "CWE-305", name: "Authentication Bypass by Primary Weakness", }, discovery_date: "2019-03-20T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1691126", }, ], notes: [ { category: "description", text: "A vulnerability was found in mod_auth_mellon. If Apache is configured as a reverse proxy and mod_auth_mellon is configured to only let through authenticated users (with the require valid-user directive), adding special HTTP headers that are normally used to start the special SAML ECP (non-browser based) can be used to bypass authentication.", title: "Vulnerability description", }, { category: "summary", text: "mod_auth_mellon: authentication bypass in ECP flow", title: "Vulnerability summary", }, { category: "other", text: "This issue did not affect the versions of mod_auth_mellon as shipped with Red Hat Enterprise Linux 6 as they did not include support for ECP.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.src", "6Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", "6Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.src", "6Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", "6Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-3878", }, { category: "external", summary: "RHBZ#1691126", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1691126", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-3878", url: "https://www.cve.org/CVERecord?id=CVE-2019-3878", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-3878", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-3878", }, { category: "external", summary: "https://github.com/Uninett/mod_auth_mellon/pull/196", url: "https://github.com/Uninett/mod_auth_mellon/pull/196", }, ], release_date: "2018-05-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-04-11T11:59:20+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "6Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.src", "6Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", "6Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.src", "6Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", "6Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:0746", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", version: "3.0", }, products: [ "6Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.src", "6Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", "6Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", "6Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.src", "6Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el6.1.noarch", "6Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el6.1.x86_64", "6Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el6.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-Alt-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-Alt-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Server-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Server-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.src", "7Workstation-RHSCL-3.2:httpd24-httpd-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-debuginfo-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-devel-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-httpd-manual-0:2.4.34-7.el7.1.noarch", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-httpd-tools-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.src", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-0:0.13.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_auth_mellon-debuginfo-0:0.13.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_ldap-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_md-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_proxy_html-1:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_session-0:2.4.34-7.el7.1.x86_64", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.aarch64", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.ppc64le", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.s390x", "7Workstation-RHSCL-3.2:httpd24-mod_ssl-1:2.4.34-7.el7.1.x86_64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "mod_auth_mellon: authentication bypass in ECP flow", }, ], }
rhsa-2019_0980
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: privilege escalation from modules scripts (CVE-2019-0211)\n\n* httpd: mod_ssl: access control bypass when using per-location client certification authentication (CVE-2019-0215)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2019:0980", url: "https://access.redhat.com/errata/RHSA-2019:0980", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "1694980", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1694980", }, { category: "external", summary: "1695025", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1695025", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_0980.json", }, ], title: "Red Hat Security Advisory: httpd:2.4 security update", tracking: { current_release_date: "2024-11-22T12:56:59+00:00", generator: { date: "2024-11-22T12:56:59+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2019:0980", initial_release_date: "2019-05-07T04:19:52+00:00", revision_history: [ { date: "2019-05-07T04:19:52+00:00", number: "1", summary: "Initial version", }, { date: "2019-05-07T04:19:52+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T12:56:59+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AppStream (v. 8)", product: { name: "Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z", product_identification_helper: { cpe: "cpe:/a:redhat:enterprise_linux:8::appstream", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "httpd:2.4:8000020190405071959:55190bc5", product: { name: "httpd:2.4:8000020190405071959:55190bc5", product_id: "httpd:2.4:8000020190405071959:55190bc5", product_identification_helper: { purl: "pkg:rpmmod/redhat/httpd@2.4:8000020190405071959:55190bc5", }, }, }, { category: "product_version", name: "httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", product: { name: "httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", product_id: "httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-filesystem@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=noarch", }, }, }, { category: "product_version", name: "httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", product: { name: "httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", product_id: "httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-manual@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product: { name: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_id: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x", }, }, }, { category: "product_version", name: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product: { name: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_id: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x", }, }, }, { category: "product_version", name: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product: { name: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_id: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debugsource@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x", }, }, }, { category: "product_version", name: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product: { name: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_id: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-devel@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x", }, }, }, { category: "product_version", name: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product: { name: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_id: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x", }, }, }, { category: "product_version", name: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product: { name: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_id: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x", }, }, }, { category: "product_version", name: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", product: { name: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", product_id: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x", }, }, }, { category: "product_version", name: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", product: { name: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", product_id: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x", }, }, }, { category: "product_version", name: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", product: { name: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", product_id: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x", }, }, }, { category: "product_version", name: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product: { name: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_id: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x", }, }, }, { category: "product_version", name: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product: { name: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_id: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x", }, }, }, { category: "product_version", name: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product: { name: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_id: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x", }, }, }, { category: "product_version", name: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product: { name: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_id: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x", }, }, }, { category: "product_version", name: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product: { name: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_id: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product: { name: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_id: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product: { name: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_id: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x", }, }, }, { category: "product_version", name: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product: { name: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_id: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x", }, }, }, { category: "product_version", name: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product: { name: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_id: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x&epoch=1", }, }, }, { category: "product_version", name: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product: { name: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_id: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x&epoch=1", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", product: { name: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", product_id: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", product_identification_helper: { purl: "pkg:rpm/redhat/httpd@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=src", }, }, }, { category: "product_version", name: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", product: { name: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", product_id: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product: { name: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_id: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64", }, }, }, { category: "product_version", name: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product: { name: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_id: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64", }, }, }, { category: "product_version", name: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product: { name: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_id: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debugsource@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64", }, }, }, { category: "product_version", name: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product: { name: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_id: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-devel@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64", }, }, }, { category: "product_version", name: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product: { name: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_id: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64", }, }, }, { category: "product_version", name: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product: { name: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_id: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64", }, }, }, { category: "product_version", name: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", product: { name: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", product_id: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64", }, }, }, { category: "product_version", name: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", product: { name: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", product_id: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64", }, }, }, { category: "product_version", name: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", product: { name: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", product_id: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64", }, }, }, { category: "product_version", name: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product: { name: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_id: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64", }, }, }, { category: "product_version", name: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product: { name: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_id: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64", }, }, }, { category: "product_version", name: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product: { name: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_id: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64", }, }, }, { category: "product_version", name: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product: { name: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_id: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64", }, }, }, { category: "product_version", name: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product: { name: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_id: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product: { name: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_id: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product: { name: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_id: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64", }, }, }, { category: "product_version", name: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product: { name: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_id: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64", }, }, }, { category: "product_version", name: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product: { name: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_id: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64&epoch=1", }, }, }, { category: "product_version", name: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product: { name: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_id: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64&epoch=1", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product: { name: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_id: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product: { name: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_id: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product: { name: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_id: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debugsource@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product: { name: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_id: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-devel@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product: { name: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_id: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le", }, }, }, { category: "product_version", name: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product: { name: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_id: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", product: { name: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", product_id: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", product: { name: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", product_id: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", product: { name: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", product_id: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product: { name: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_id: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product: { name: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_id: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product: { name: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_id: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product: { name: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_id: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product: { name: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_id: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product: { name: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_id: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product: { name: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_id: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product: { name: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_id: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le", }, }, }, { category: "product_version", name: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product: { name: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_id: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le&epoch=1", }, }, }, { category: "product_version", name: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product: { name: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_id: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le&epoch=1", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product: { name: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_id: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64", }, }, }, { category: "product_version", name: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product: { name: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_id: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64", }, }, }, { category: "product_version", name: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product: { name: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_id: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-debugsource@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64", }, }, }, { category: "product_version", name: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product: { name: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_id: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-devel@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64", }, }, }, { category: "product_version", name: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product: { name: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_id: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64", }, }, }, { category: "product_version", name: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product: { name: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_id: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64", }, }, }, { category: "product_version", name: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", product: { name: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", product_id: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64", }, }, }, { category: "product_version", name: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", product: { name: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", product_id: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64", }, }, }, { category: "product_version", name: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", product: { name: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", product_id: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64", }, }, }, { category: "product_version", name: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product: { name: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_id: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64", }, }, }, { category: "product_version", name: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product: { name: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_id: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64", }, }, }, { category: "product_version", name: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product: { name: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_id: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64", }, }, }, { category: "product_version", name: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product: { name: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_id: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64", }, }, }, { category: "product_version", name: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product: { name: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_id: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product: { name: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_id: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product: { name: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_id: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64", }, }, }, { category: "product_version", name: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product: { name: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_id: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64", }, }, }, { category: "product_version", name: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product: { name: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_id: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product: { name: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_id: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64&epoch=1", }, }, }, ], category: "architecture", name: "x86_64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, product_reference: "httpd:2.4:8000020190405071959:55190bc5", relates_to_product_reference: "AppStream-8.0.0.Z", }, { category: "default_component_of", full_product_name: { name: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", }, product_reference: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", }, product_reference: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", }, product_reference: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", }, product_reference: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", }, product_reference: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", }, product_reference: "httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", }, product_reference: "httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", }, product_reference: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", }, product_reference: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", }, product_reference: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", }, product_reference: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", }, product_reference: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", }, product_reference: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", }, product_reference: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", }, product_reference: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", }, product_reference: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", }, product_reference: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", }, product_reference: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", }, product_reference: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", }, product_reference: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", }, product_reference: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", }, product_reference: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", }, product_reference: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", }, product_reference: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", }, product_reference: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, { category: "default_component_of", full_product_name: { name: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", }, product_reference: "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", relates_to_product_reference: "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", }, ], }, vulnerabilities: [ { cve: "CVE-2019-0211", cwe: { id: "CWE-250", name: "Execution with Unnecessary Privileges", }, discovery_date: "2019-04-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1694980", }, ], notes: [ { category: "description", text: "A flaw was found in Apache where code executing in a less-privileged child process or thread could execute arbitrary code with the privilege of the parent process (usually root). An attacker having access to run arbitrary scripts on the web server (PHP, CGI etc) could use this flaw to run code on the web server with root privileges.", title: "Vulnerability description", }, { category: "summary", text: "httpd: privilege escalation from modules scripts", title: "Vulnerability summary", }, { category: "other", text: "This flaw is exploitable in httpd if it is configured to allow an untrusted user to upload and execute arbitrary scripts. Due to the nature of the flaw, the uploaded script would not run as a restricted privileged user, but rather it runs as root allowing for privilege escalation from the restricted user to root on the web server. \n\nDepending on the configuration of the server, you would need local (AV:L) privileges to place the script or network (AV:N) privileges if the server ran an application that permitted uploading scripts directly. The latter scenario is not common for unauthenticated users. Once the attacker can place the script somewhere in the web root where it can be easily exploited (AC:L). This type of setup is more common in shared hosted environments (PR:L) and would allow an attacker with access to a site on the shared hosted to impact the confidentiality, integrity, and availability (CIA:H) with no interaction (UI:N). Due to the elevated privileges obtained, there is an impact to the system beyond the web server itself (S:C).", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-0211", }, { category: "external", summary: "RHBZ#1694980", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1694980", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-0211", url: "https://www.cve.org/CVERecord?id=CVE-2019-0211", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-0211", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-0211", }, { category: "external", summary: "http://www.apache.org/dist/httpd/CHANGES_2.4", url: "http://www.apache.org/dist/httpd/CHANGES_2.4", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211", }, { category: "external", summary: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", url: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, ], release_date: "2019-04-01T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-05-07T04:19:52+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:0980", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", ], }, ], threats: [ { category: "exploit_status", date: "2021-11-03T00:00:00+00:00", details: "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, { category: "impact", details: "Important", }, ], title: "httpd: privilege escalation from modules scripts", }, { cve: "CVE-2019-0215", cwe: { id: "CWE-284", name: "Improper Access Control", }, discovery_date: "2019-04-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1695025", }, ], notes: [ { category: "description", text: "A flaw was found in Apache HTTP Server 2.4 (releases 2.4.37 and 2.4.38). A bug in mod_ssl, when using per-location client certificate verification with TLSv1.3, allowed a client supporting Post-Handshake Authentication to bypass configured access control restrictions. An attacker could perform various unauthorized actions after bypassing the restrictions. The highest threat from this vulnerability is to data confidentiality and integrity.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_ssl: access control bypass when using per-location client certification authentication", title: "Vulnerability summary", }, { category: "other", text: "This flaw can be exploited for httpd configurations where per-location client certificates are enabled and TLS 1.3 is used. \n\nThe attacker can remotely exploit this httpd flaw (AV:N). However the server had to be configured to use per-location client certificate and the attacker needs to have access to the authenticating client certificate (AC:H). No other significant privileges are required by the attacker (PR:L). The result of the attack is bypass of the configured access control restrictions (CI:H). This however does not affect the system beyond the web server itself (S:U).", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-0215", }, { category: "external", summary: "RHBZ#1695025", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1695025", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-0215", url: "https://www.cve.org/CVERecord?id=CVE-2019-0215", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-0215", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-0215", }, { category: "external", summary: "http://www.apache.org/dist/httpd/CHANGES_2.4", url: "http://www.apache.org/dist/httpd/CHANGES_2.4", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html", url: "https://httpd.apache.org/security/vulnerabilities_24.html", }, ], release_date: "2019-04-01T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-05-07T04:19:52+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:0980", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.8, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", version: "3.0", }, products: [ "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "httpd: mod_ssl: access control bypass when using per-location client certification authentication", }, ], }
rhsa-2019_1297
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update is now available for JBoss Core Services on RHEL 6 and RHEL 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.", title: "Topic", }, { category: "general", text: "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.\n\nThis release of Red Hat JBoss Core Services Apache HTTP Server 2.4.29 Service Pack 2 serves as an update to Red Hat JBoss Core Services Apache HTTP Server 2.4.29, and includes bug fixes for CVEs which are linked to in the References section.\n\nSecurity Fix(es):\n\n* openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang (CVE-2018-0732)\n\n* openssl: ROHNP - Key Extraction Side Channel in Multiple Crypto Libraries (CVE-2018-0495)\n\n* httpd: privilege escalation from modules scripts (CVE-2019-0211)\n\nDetails around this issue, including information about the CVE, severity of the issue, and CVSS scores can be found on the CVE pages listed in the References section below.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2019:1297", url: "https://access.redhat.com/errata/RHSA-2019:1297", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "1591100", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1591100", }, { category: "external", summary: "1591163", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1591163", }, { category: "external", summary: "1694980", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1694980", }, { category: "external", summary: "JBCS-620", url: "https://issues.redhat.com/browse/JBCS-620", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1297.json", }, ], title: "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 SP2 security update", tracking: { current_release_date: "2024-11-22T12:07:43+00:00", generator: { date: "2024-11-22T12:07:43+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2019:1297", initial_release_date: "2019-05-30T14:57:48+00:00", revision_history: [ { date: "2019-05-30T14:57:48+00:00", number: "1", summary: "Initial version", }, { date: "2019-05-30T14:57:48+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T12:07:43+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat JBoss Core Services on RHEL 7 Server", product: { name: "Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS", product_identification_helper: { cpe: "cpe:/a:redhat:jboss_core_services:1::el7", }, }, }, { category: "product_name", name: "Red Hat JBoss Core Services on RHEL 6 Server", product: { name: "Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS", product_identification_helper: { cpe: "cpe:/a:redhat:jboss_core_services:1::el6", }, }, }, ], category: "product_family", name: "Red Hat JBoss Core Services", }, { branches: [ { category: "product_version", name: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64", product: { name: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64", product_id: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2n-15.jbcs.el7?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64", product: { name: "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64", product_id: "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2n-15.jbcs.el7?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64", product: { name: "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64", product_id: "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2n-15.jbcs.el7?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64", product: { name: "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64", product_id: "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2n-15.jbcs.el7?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64", product: { name: "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64", product_id: "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2n-15.jbcs.el7?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64", product: { name: "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64", product_id: "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2n-15.jbcs.el7?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64", product: { name: "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64", product_id: "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.29-40.jbcs.el7?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64", product: { name: "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64", product_id: "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.29-40.jbcs.el7?arch=x86_64", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64", product: { name: "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64", product_id: "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.29-40.jbcs.el7?arch=x86_64", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64", product: { name: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64", product_id: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.29-40.jbcs.el7?arch=x86_64", }, }, }, { category: "product_version", name: "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64", product: { name: "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64", product_id: "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.29-40.jbcs.el7?arch=x86_64", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64", product: { name: "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64", product_id: "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.29-40.jbcs.el7?arch=x86_64", }, }, }, { category: "product_version", name: "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64", product: { name: "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64", product_id: "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.29-40.jbcs.el7?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64", product: { name: "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64", product_id: "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.29-40.jbcs.el7?arch=x86_64", }, }, }, { category: "product_version", name: "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64", product: { name: "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64", product_id: "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.29-40.jbcs.el7?arch=x86_64", }, }, }, { category: "product_version", name: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64", product: { name: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64", product_id: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2n-15.jbcs.el6?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64", product: { name: "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64", product_id: "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2n-15.jbcs.el6?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64", product: { name: "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64", product_id: "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2n-15.jbcs.el6?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64", product: { name: "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64", product_id: "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2n-15.jbcs.el6?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64", product: { name: "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64", product_id: "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2n-15.jbcs.el6?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64", product: { name: "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64", product_id: "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2n-15.jbcs.el6?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64", product: { name: "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64", product_id: "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.29-40.jbcs.el6?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64", product: { name: "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64", product_id: "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.29-40.jbcs.el6?arch=x86_64", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64", product: { name: "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64", product_id: "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.29-40.jbcs.el6?arch=x86_64", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64", product: { name: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64", product_id: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.29-40.jbcs.el6?arch=x86_64", }, }, }, { category: "product_version", name: "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64", product: { name: "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64", product_id: "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.29-40.jbcs.el6?arch=x86_64", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64", product: { name: "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64", product_id: "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.29-40.jbcs.el6?arch=x86_64", }, }, }, { category: "product_version", name: "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64", product: { name: "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64", product_id: "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.29-40.jbcs.el6?arch=x86_64&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64", product: { name: "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64", product_id: "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.29-40.jbcs.el6?arch=x86_64", }, }, }, { category: "product_version", name: "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64", product: { name: "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64", product_id: "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.29-40.jbcs.el6?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src", product: { name: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src", product_id: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2n-15.jbcs.el7?arch=src&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src", product: { name: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src", product_id: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.29-40.jbcs.el7?arch=src", }, }, }, { category: "product_version", name: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src", product: { name: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src", product_id: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2n-15.jbcs.el6?arch=src&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src", product: { name: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src", product_id: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.29-40.jbcs.el6?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch", product: { name: "jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch", product_id: "jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.29-40.jbcs.el7?arch=noarch", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch", product: { name: "jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch", product_id: "jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.29-40.jbcs.el6?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686", product: { name: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686", product_id: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2n-15.jbcs.el6?arch=i686&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686", product: { name: "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686", product_id: "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2n-15.jbcs.el6?arch=i686&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686", product: { name: "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686", product_id: "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2n-15.jbcs.el6?arch=i686&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686", product: { name: "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686", product_id: "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2n-15.jbcs.el6?arch=i686&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686", product: { name: "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686", product_id: "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2n-15.jbcs.el6?arch=i686&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686", product: { name: "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686", product_id: "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2n-15.jbcs.el6?arch=i686&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686", product: { name: "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686", product_id: "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.29-40.jbcs.el6?arch=i686&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686", product: { name: "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686", product_id: "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.29-40.jbcs.el6?arch=i686", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686", product: { name: "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686", product_id: "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.29-40.jbcs.el6?arch=i686", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686", product: { name: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686", product_id: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.29-40.jbcs.el6?arch=i686", }, }, }, { category: "product_version", name: "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686", product: { name: "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686", product_id: "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.29-40.jbcs.el6?arch=i686", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686", product: { name: "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686", product_id: "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.29-40.jbcs.el6?arch=i686", }, }, }, { category: "product_version", name: "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686", product: { name: "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686", product_id: "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.29-40.jbcs.el6?arch=i686&epoch=1", }, }, }, { category: "product_version", name: "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686", product: { name: "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686", product_id: "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.29-40.jbcs.el6?arch=i686", }, }, }, { category: "product_version", name: "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686", product: { name: "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686", product_id: "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686", product_identification_helper: { purl: "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.29-40.jbcs.el6?arch=i686", }, }, }, ], category: "architecture", name: "i686", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686", }, product_reference: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src", }, product_reference: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64", }, product_reference: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686", }, product_reference: "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64", }, product_reference: "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686", }, product_reference: "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64", }, product_reference: "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch", }, product_reference: "jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686", }, product_reference: "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64", }, product_reference: "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686", }, product_reference: "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64", }, product_reference: "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686", }, product_reference: "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64", }, product_reference: "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686", }, product_reference: "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64", }, product_reference: "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686", }, product_reference: "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64", }, product_reference: "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686", }, product_reference: "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64", }, product_reference: "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686", }, product_reference: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src", }, product_reference: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64", }, product_reference: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686", }, product_reference: "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64", }, product_reference: "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686", }, product_reference: "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64", }, product_reference: "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686", }, product_reference: "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64", }, product_reference: "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686", }, product_reference: "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64", }, product_reference: "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686", }, product_reference: "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", product_id: "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64", }, product_reference: "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64", relates_to_product_reference: "6Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src", }, product_reference: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src", relates_to_product_reference: "7Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64", }, product_reference: "jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64", relates_to_product_reference: "7Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64", }, product_reference: "jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64", relates_to_product_reference: "7Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64", }, product_reference: "jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64", relates_to_product_reference: "7Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch", }, product_reference: "jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch", relates_to_product_reference: "7Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64", }, product_reference: "jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64", relates_to_product_reference: "7Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64", }, product_reference: "jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64", relates_to_product_reference: "7Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64", }, product_reference: "jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64", relates_to_product_reference: "7Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64", }, product_reference: "jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64", relates_to_product_reference: "7Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64", }, product_reference: "jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64", relates_to_product_reference: "7Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64", }, product_reference: "jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64", relates_to_product_reference: "7Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src", }, product_reference: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src", relates_to_product_reference: "7Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64", }, product_reference: "jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64", relates_to_product_reference: "7Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64", }, product_reference: "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64", relates_to_product_reference: "7Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64", }, product_reference: "jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64", relates_to_product_reference: "7Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64", }, product_reference: "jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64", relates_to_product_reference: "7Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64", }, product_reference: "jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64", relates_to_product_reference: "7Server-JBCS", }, { category: "default_component_of", full_product_name: { name: "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", product_id: "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64", }, product_reference: "jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64", relates_to_product_reference: "7Server-JBCS", }, ], }, vulnerabilities: [ { cve: "CVE-2018-0495", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, discovery_date: "2018-06-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1591163", }, ], notes: [ { category: "description", text: "Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.", title: "Vulnerability description", }, { category: "summary", text: "ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries", title: "Vulnerability summary", }, { category: "other", text: "Since the 5.8.3 release, Red Hat CloudForms no longer uses libtomcrypt.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-0495", }, { category: "external", summary: "RHBZ#1591163", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1591163", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-0495", url: "https://www.cve.org/CVERecord?id=CVE-2018-0495", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-0495", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-0495", }, { category: "external", summary: "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/", url: "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/", }, ], release_date: "2018-06-13T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-05-30T14:57:48+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1297", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.1, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries", }, { cve: "CVE-2018-0732", cwe: { id: "CWE-325", name: "Missing Cryptographic Step", }, discovery_date: "2018-06-14T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1591100", }, ], notes: [ { category: "description", text: "During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).", title: "Vulnerability description", }, { category: "summary", text: "openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-0732", }, { category: "external", summary: "RHBZ#1591100", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1591100", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-0732", url: "https://www.cve.org/CVERecord?id=CVE-2018-0732", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-0732", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-0732", }, { category: "external", summary: "https://www.openssl.org/news/secadv/20180612.txt", url: "https://www.openssl.org/news/secadv/20180612.txt", }, ], release_date: "2018-06-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-05-30T14:57:48+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1297", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang", }, { cve: "CVE-2019-0211", cwe: { id: "CWE-250", name: "Execution with Unnecessary Privileges", }, discovery_date: "2019-04-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1694980", }, ], notes: [ { category: "description", text: "A flaw was found in Apache where code executing in a less-privileged child process or thread could execute arbitrary code with the privilege of the parent process (usually root). An attacker having access to run arbitrary scripts on the web server (PHP, CGI etc) could use this flaw to run code on the web server with root privileges.", title: "Vulnerability description", }, { category: "summary", text: "httpd: privilege escalation from modules scripts", title: "Vulnerability summary", }, { category: "other", text: "This flaw is exploitable in httpd if it is configured to allow an untrusted user to upload and execute arbitrary scripts. Due to the nature of the flaw, the uploaded script would not run as a restricted privileged user, but rather it runs as root allowing for privilege escalation from the restricted user to root on the web server. \n\nDepending on the configuration of the server, you would need local (AV:L) privileges to place the script or network (AV:N) privileges if the server ran an application that permitted uploading scripts directly. The latter scenario is not common for unauthenticated users. Once the attacker can place the script somewhere in the web root where it can be easily exploited (AC:L). This type of setup is more common in shared hosted environments (PR:L) and would allow an attacker with access to a site on the shared hosted to impact the confidentiality, integrity, and availability (CIA:H) with no interaction (UI:N). Due to the elevated privileges obtained, there is an impact to the system beyond the web server itself (S:C).", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-0211", }, { category: "external", summary: "RHBZ#1694980", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1694980", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-0211", url: "https://www.cve.org/CVERecord?id=CVE-2019-0211", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-0211", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-0211", }, { category: "external", summary: "http://www.apache.org/dist/httpd/CHANGES_2.4", url: "http://www.apache.org/dist/httpd/CHANGES_2.4", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211", url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211", }, { category: "external", summary: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", url: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, ], release_date: "2019-04-01T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-05-30T14:57:48+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", product_ids: [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:1297", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-40.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-15.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-15.jbcs.el7.x86_64", ], }, ], threats: [ { category: "exploit_status", date: "2021-11-03T00:00:00+00:00", details: "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, { category: "impact", details: "Important", }, ], title: "httpd: privilege escalation from modules scripts", }, ], }
gsd-2019-0211
Vulnerability from gsd
{ GSD: { alias: "CVE-2019-0211", description: "In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected.", id: "GSD-2019-0211", references: [ "https://www.suse.com/security/cve/CVE-2019-0211.html", "https://www.debian.org/security/2019/dsa-4422", "https://access.redhat.com/errata/RHSA-2019:1543", "https://access.redhat.com/errata/RHSA-2019:1297", "https://access.redhat.com/errata/RHSA-2019:1296", "https://access.redhat.com/errata/RHSA-2019:0980", "https://access.redhat.com/errata/RHSA-2019:0746", "https://ubuntu.com/security/CVE-2019-0211", "https://security.archlinux.org/CVE-2019-0211", "https://alas.aws.amazon.com/cve/html/CVE-2019-0211.html", "https://linux.oracle.com/cve/CVE-2019-0211.html", "https://packetstormsecurity.com/files/cve/CVE-2019-0211", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2019-0211", ], details: "In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected.", id: "GSD-2019-0211", modified: "2023-12-13T01:23:39.314946Z", schema_version: "1.4.0", }, }, namespaces: { "cisa.gov": { cveID: "CVE-2019-0211", dateAdded: "2021-11-03", dueDate: "2022-05-03", product: "HTTP Server", requiredAction: "Apply updates per vendor instructions.", shortDescription: "In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected.", vendorProject: "Apache", vulnerabilityName: "Apache HTTP Server scoreboard vulnerability", }, "cve.org": { CVE_data_meta: { ASSIGNER: "security@apache.org", ID: "CVE-2019-0211", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Apache HTTP Server", version: { version_data: [ { version_value: "2.4.17 to 2.4.38", }, ], }, }, ], }, vendor_name: "Apache", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Apache HTTP Server privilege escalation from modules' scripts", }, ], }, ], }, references: { reference_data: [ { name: "[oss-security] 20190401 CVE-2019-0211: Apache HTTP Server privilege escalation from modules' scripts", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2019/04/02/3", }, { name: "107666", refsource: "BID", url: "http://www.securityfocus.com/bid/107666", }, { name: "20190403 [SECURITY] [DSA 4422-1] apache2 security update", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Apr/5", }, { name: "https://www.synology.com/security/advisory/Synology_SA_19_14", refsource: "CONFIRM", url: "https://www.synology.com/security/advisory/Synology_SA_19_14", }, { name: "http://packetstormsecurity.com/files/152386/Apache-2.4.38-Root-Privilege-Escalation.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/152386/Apache-2.4.38-Root-Privilege-Escalation.html", }, { name: "USN-3937-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3937-1/", }, { name: "FEDORA-2019-cf7695b470", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/", }, { name: "DSA-4422", refsource: "DEBIAN", url: "https://www.debian.org/security/2019/dsa-4422", }, { name: "[httpd-users] 20190406 [users@httpd] CVE-2019-0211/0215/0217", refsource: "MLIST", url: "https://lists.apache.org/thread.html/b1613d44ec364c87bb7ee8c5939949f9b061c05c06e0e90098ebf7aa@%3Cusers.httpd.apache.org%3E", }, { name: "FEDORA-2019-119b14075a", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/", }, { name: "20190407 [slackware-security] httpd (SSA:2019-096-01)", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Apr/16", }, { name: "46676", refsource: "EXPLOIT-DB", url: "https://www.exploit-db.com/exploits/46676/", }, { name: "https://httpd.apache.org/security/vulnerabilities_24.html", refsource: "MISC", url: "https://httpd.apache.org/security/vulnerabilities_24.html", }, { name: "http://packetstormsecurity.com/files/152415/Slackware-Security-Advisory-httpd-Updates.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/152415/Slackware-Security-Advisory-httpd-Updates.html", }, { name: "http://packetstormsecurity.com/files/152441/CARPE-DIEM-Apache-2.4.x-Local-Privilege-Escalation.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/152441/CARPE-DIEM-Apache-2.4.x-Local-Privilege-Escalation.html", }, { name: "http://www.apache.org/dist/httpd/CHANGES_2.4.39", refsource: "MISC", url: "http://www.apache.org/dist/httpd/CHANGES_2.4.39", }, { name: "[community-dev] 20190411 CVE-2019-0211 applicable to versions 2.2.x?", refsource: "MLIST", url: "https://lists.apache.org/thread.html/890507b85c30adf133216b299cc35cd8cd0346a885acfc671c04694e@%3Cdev.community.apache.org%3E", }, { name: "[community-dev] 20190411 Re: CVE-2019-0211 applicable to versions 2.2.x?", refsource: "MLIST", url: "https://lists.apache.org/thread.html/b2bdb308dc015e771ba79c0586b2de6fb50caa98b109833f5d4daf28@%3Cdev.community.apache.org%3E", }, { name: "RHSA-2019:0746", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2019:0746", }, { name: "openSUSE-SU-2019:1190", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00051.html", }, { name: "[community-dev] 20190411 RE: CVE-2019-0211 applicable to versions 2.2.x?", refsource: "MLIST", url: "https://lists.apache.org/thread.html/de881a130bc9cb2f3a9ff220784520556884fb8ea80e69400a45509e@%3Cdev.community.apache.org%3E", }, { name: "https://support.f5.com/csp/article/K32957101", refsource: "CONFIRM", url: "https://support.f5.com/csp/article/K32957101", }, { name: "openSUSE-SU-2019:1209", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00061.html", }, { name: "GLSA-201904-20", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201904-20", }, { name: "https://security.netapp.com/advisory/ntap-20190423-0001/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20190423-0001/", }, { name: "openSUSE-SU-2019:1258", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html", }, { name: "RHSA-2019:0980", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2019:0980", }, { name: "RHBA-2019:0959", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHBA-2019:0959", }, { name: "FEDORA-2019-a4ed7400f4", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/", }, { name: "RHSA-2019:1297", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2019:1297", }, { name: "RHSA-2019:1296", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2019:1296", }, { name: "[httpd-cvs] 20190611 svn commit: r1861068 - /httpd/site/trunk/content/security/vulnerabilities-httpd.xml", refsource: "MLIST", url: "https://lists.apache.org/thread.html/fd110f4ace2d8364c7d9190e1993cde92f79e4eb85576ed9285686ac@%3Ccvs.httpd.apache.org%3E", }, { name: "RHSA-2019:1543", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2019:1543", }, { name: "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html", refsource: "MISC", url: "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html", }, { name: "[oss-security] 20190726 Re: Statistics for distros lists updated for 2019Q2", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2019/07/26/7", }, { name: "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", url: "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", url: "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E", }, { name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us", refsource: "CONFIRM", url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us", }, { name: "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", refsource: "MISC", url: "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", }, { name: "[announce] 20200131 Apache Software Foundation Security Report: 2019", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E", }, { name: "[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", url: "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", url: "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E", }, { name: "https://www.oracle.com/security-alerts/cpuapr2020.html", refsource: "MISC", url: "https://www.oracle.com/security-alerts/cpuapr2020.html", }, { name: "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", refsource: "MLIST", url: "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", url: "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/", refsource: "MLIST", url: "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073149 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", refsource: "MLIST", url: "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E", }, ], }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.4.38", versionStartIncluding: "2.4.17", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "security@apache.org", ID: "CVE-2019-0211", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-416", }, ], }, ], }, references: { reference_data: [ { name: "46676", refsource: "EXPLOIT-DB", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "https://www.exploit-db.com/exploits/46676/", }, { name: "DSA-4422", refsource: "DEBIAN", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2019/dsa-4422", }, { name: "USN-3937-1", refsource: "UBUNTU", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3937-1/", }, { name: "20190403 [SECURITY] [DSA 4422-1] apache2 security update", refsource: "BUGTRAQ", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://seclists.org/bugtraq/2019/Apr/5", }, { name: "20190407 [slackware-security] httpd (SSA:2019-096-01)", refsource: "BUGTRAQ", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://seclists.org/bugtraq/2019/Apr/16", }, { name: "FEDORA-2019-cf7695b470", refsource: "FEDORA", tags: [ "Third Party Advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/", }, { name: "FEDORA-2019-119b14075a", refsource: "FEDORA", tags: [ "Third Party Advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/", }, { name: "[httpd-users] 20190406 [users@httpd] CVE-2019-0211/0215/0217", refsource: "MLIST", tags: [ "Mailing List", "Vendor Advisory", ], url: "https://lists.apache.org/thread.html/b1613d44ec364c87bb7ee8c5939949f9b061c05c06e0e90098ebf7aa@%3Cusers.httpd.apache.org%3E", }, { name: "https://httpd.apache.org/security/vulnerabilities_24.html", refsource: "MISC", tags: [ "Vendor Advisory", ], url: "https://httpd.apache.org/security/vulnerabilities_24.html", }, { name: "107666", refsource: "BID", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/107666", }, { name: "[oss-security] 20190401 CVE-2019-0211: Apache HTTP Server privilege escalation from modules' scripts", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2019/04/02/3", }, { name: "http://www.apache.org/dist/httpd/CHANGES_2.4.39", refsource: "MISC", tags: [ "Vendor Advisory", ], url: "http://www.apache.org/dist/httpd/CHANGES_2.4.39", }, { name: "http://packetstormsecurity.com/files/152441/CARPE-DIEM-Apache-2.4.x-Local-Privilege-Escalation.html", refsource: "MISC", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/152441/CARPE-DIEM-Apache-2.4.x-Local-Privilege-Escalation.html", }, { name: "http://packetstormsecurity.com/files/152415/Slackware-Security-Advisory-httpd-Updates.html", refsource: "MISC", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/152415/Slackware-Security-Advisory-httpd-Updates.html", }, { name: "http://packetstormsecurity.com/files/152386/Apache-2.4.38-Root-Privilege-Escalation.html", refsource: "MISC", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/152386/Apache-2.4.38-Root-Privilege-Escalation.html", }, { name: "[community-dev] 20190411 CVE-2019-0211 applicable to versions 2.2.x?", refsource: "MLIST", tags: [ "Mailing List", "Vendor Advisory", ], url: "https://lists.apache.org/thread.html/890507b85c30adf133216b299cc35cd8cd0346a885acfc671c04694e@%3Cdev.community.apache.org%3E", }, { name: "[community-dev] 20190411 Re: CVE-2019-0211 applicable to versions 2.2.x?", refsource: "MLIST", tags: [ "Mailing List", "Vendor Advisory", ], url: "https://lists.apache.org/thread.html/b2bdb308dc015e771ba79c0586b2de6fb50caa98b109833f5d4daf28@%3Cdev.community.apache.org%3E", }, { name: "RHSA-2019:0746", refsource: "REDHAT", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2019:0746", }, { name: "openSUSE-SU-2019:1190", refsource: "SUSE", tags: [ "Mailing List", "Release Notes", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00051.html", }, { name: "[community-dev] 20190411 RE: CVE-2019-0211 applicable to versions 2.2.x?", refsource: "MLIST", tags: [ "Mailing List", "Vendor Advisory", ], url: "https://lists.apache.org/thread.html/de881a130bc9cb2f3a9ff220784520556884fb8ea80e69400a45509e@%3Cdev.community.apache.org%3E", }, { name: "https://support.f5.com/csp/article/K32957101", refsource: "CONFIRM", tags: [ "Third Party Advisory", ], url: "https://support.f5.com/csp/article/K32957101", }, { name: "openSUSE-SU-2019:1209", refsource: "SUSE", tags: [ "Mailing List", "Release Notes", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00061.html", }, { name: "GLSA-201904-20", refsource: "GENTOO", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201904-20", }, { name: "https://security.netapp.com/advisory/ntap-20190423-0001/", refsource: "CONFIRM", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20190423-0001/", }, { name: "openSUSE-SU-2019:1258", refsource: "SUSE", tags: [ "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html", }, { name: "RHSA-2019:0980", refsource: "REDHAT", tags: [], url: "https://access.redhat.com/errata/RHSA-2019:0980", }, { name: "RHBA-2019:0959", refsource: "REDHAT", tags: [], url: "https://access.redhat.com/errata/RHBA-2019:0959", }, { name: "FEDORA-2019-a4ed7400f4", refsource: "FEDORA", tags: [], url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/", }, { name: "https://www.synology.com/security/advisory/Synology_SA_19_14", refsource: "CONFIRM", tags: [], url: "https://www.synology.com/security/advisory/Synology_SA_19_14", }, { name: "RHSA-2019:1297", refsource: "REDHAT", tags: [], url: "https://access.redhat.com/errata/RHSA-2019:1297", }, { name: "RHSA-2019:1296", refsource: "REDHAT", tags: [], url: "https://access.redhat.com/errata/RHSA-2019:1296", }, { name: "[httpd-cvs] 20190611 svn commit: r1861068 - /httpd/site/trunk/content/security/vulnerabilities-httpd.xml", refsource: "MLIST", tags: [], url: "https://lists.apache.org/thread.html/fd110f4ace2d8364c7d9190e1993cde92f79e4eb85576ed9285686ac@%3Ccvs.httpd.apache.org%3E", }, { name: "RHSA-2019:1543", refsource: "REDHAT", tags: [], url: "https://access.redhat.com/errata/RHSA-2019:1543", }, { name: "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html", refsource: "MISC", tags: [], url: "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html", }, { name: "[oss-security] 20190726 Re: Statistics for distros lists updated for 2019Q2", refsource: "MLIST", tags: [], url: "http://www.openwall.com/lists/oss-security/2019/07/26/7", }, { name: "[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", tags: [], url: "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", tags: [], url: "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E", }, { name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us", refsource: "CONFIRM", tags: [], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us", }, { name: "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", refsource: "MISC", tags: [], url: "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", }, { name: "[announce] 20200131 Apache Software Foundation Security Report: 2019", refsource: "MLIST", tags: [], url: "https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E", }, { name: "[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", tags: [], url: "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", tags: [], url: "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E", }, { name: "N/A", refsource: "N/A", tags: [], url: "https://www.oracle.com/security-alerts/cpuapr2020.html", }, { name: "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", refsource: "MLIST", tags: [], url: "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", refsource: "MLIST", tags: [], url: "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/", refsource: "MLIST", tags: [], url: "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/", refsource: "MLIST", tags: [], url: "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", tags: [], url: "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", refsource: "MLIST", tags: [], url: "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073149 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", refsource: "MLIST", tags: [], url: "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", tags: [], url: "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E", }, ], }, }, impact: { baseMetricV2: { acInsufInfo: false, cvssV2: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "HIGH", userInteractionRequired: false, }, baseMetricV3: { cvssV3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 1.8, impactScore: 5.9, }, }, lastModifiedDate: "2021-06-06T11:15Z", publishedDate: "2019-04-08T22:29Z", }, }, }
WID-SEC-W-2023-2047
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Apache ist ein Webserver für verschiedene Plattformen.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen im Apache HTTP Server ausnutzen, um seine Rechte zu erweitern, Sicherheitsrestriktionen zu umgehen oder um einen Denial of Service Angriff durchzuführen.", title: "Angriff", }, { category: "general", text: "- UNIX\n- Linux\n- Windows\n- NetApp Appliance", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2023-2047 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2019/wid-sec-w-2023-2047.json", }, { category: "self", summary: "WID-SEC-2023-2047 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2047", }, { category: "external", summary: "HPE Securi+y Bulletin", url: "https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-hpesbst04494en_us", }, { category: "external", summary: "Einträge in der OSS Mailing Liste vom 2019-04-02", url: "https://seclists.org/oss-sec/2019/q2/0", }, { category: "external", summary: "Einträge in der OSS Mailing Liste vom 2019-04-02", url: "https://seclists.org/oss-sec/2019/q2/1", }, { category: "external", summary: "Einträge in der OSS Mailing Liste vom 2019-04-02", url: "https://seclists.org/oss-sec/2019/q2/2", }, { category: "external", summary: "Einträge in der OSS Mailing Liste vom 2019-04-02", url: "https://seclists.org/oss-sec/2019/q2/3", }, { category: "external", summary: "Einträge in der OSS Mailing Liste vom 2019-04-02", url: "https://seclists.org/oss-sec/2019/q2/4", }, { category: "external", summary: "Einträge in der OSS Mailing Liste vom 2019-04-02", url: "https://seclists.org/oss-sec/2019/q2/5", }, { category: "external", summary: "Apache Release Notes Stand 2019-04-02", url: "https://httpd.apache.org/security/vulnerabilities_24.html", }, { category: "external", summary: "Debian Security Advisory DSA-4422 vom 2019-04-04 vom 2019-04-03", url: "https://lists.debian.org/debian-security-announce/2019/msg00066.html", }, { category: "external", summary: "Ubuntu Security Notices USN-3937-1 vom 2019-04-04", url: "https://usn.ubuntu.com/3937-1/", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:0878-1 vom 2019-04-04", url: "https://www.suse.com/de-de/support/update/announcement/2019/suse-su-20190878-1/", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:0873-1 vom 2019-04-04", url: "http://lists.suse.com/pipermail/sle-security-updates/2019-April/005295.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:0889-1 vom 2019-04-05", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20190889-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:0888-1 vom 2019-04-05", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20190888-1.html", }, { category: "external", summary: "Ubuntu Security Notice USN-3937-2 vom 2019-04-10", url: "https://usn.ubuntu.com/3937-2/", }, { category: "external", summary: "Arch Linux Security Advisory ASA-201904-3 vom 2019-04-05", url: "https://security.archlinux.org/ASA-201904-3", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:0746 vom 2019-04-11", url: "https://access.redhat.com/errata/RHSA-2019:0746", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:0888-2 vom 2019-04-12", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20190888-2.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:0251 vom 2020-01-27", url: "https://access.redhat.com/errata/RHSA-2020:0251", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:0250 vom 2020-01-27", url: "https://access.redhat.com/errata/RHSA-2020:0250", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:0980 vom 2019-05-07", url: "https://access.redhat.com/errata/RHSA-2019:0980", }, { category: "external", summary: "Exploit für CVE-2019-0211 vom 2019-05-16", url: "https://github.com/cfreal/exploits/tree/master/CVE-2019-0211-apache", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:1296 vom 2019-05-30", url: "https://access.redhat.com/errata/RHSA-2019:1296", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:1297 vom 2019-05-30", url: "https://access.redhat.com/errata/RHSA-2019:1297", }, { category: "external", summary: "NetApp Security Advisory NTAP-20190423-0001 vom 2019-06-06", url: "https://security.netapp.com/advisory/ntap-20190423-0001/", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:1543 vom 2019-06-19", url: "https://access.redhat.com/errata/RHSA-2019:1543", }, { category: "external", summary: "NetApp Security Advisory NTAP-20190625-0007 vom 2019-06-25", url: "https://security.netapp.com/advisory/ntap-20190625-0007/", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2343 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2343", }, { category: "external", summary: "HP SECURITY BULLETIN hpesbux03950en_us vom 2019-08-22", url: "https://support.hpe.com/hpsc/doc/public/display?docId=hpesbux03950en_us", }, { category: "external", summary: "Ubuntu Security Notice USN-4113-1 vom 2019-08-30", url: "https://usn.ubuntu.com/4113-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4113-2 vom 2019-09-17", url: "https://usn.ubuntu.com/4113-2/", }, { category: "external", summary: "CentOS Security Advisory CESA-2019:2343 vom 2019-09-18", url: "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-2343-Moderate-CentOS-7-httpd-Security-Update-tp4645680.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:3436 vom 2019-11-05", url: "https://access.redhat.com/errata/RHSA-2019:3436", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:3933 vom 2019-11-20", url: "https://access.redhat.com/errata/RHSA-2019:3933", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:3935 vom 2019-11-20", url: "https://access.redhat.com/errata/RHSA-2019:3935", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:3932 vom 2019-11-20", url: "https://access.redhat.com/errata/RHSA-2019:3932", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:4126 vom 2019-12-10", url: "https://access.redhat.com/errata/RHSA-2019:4126", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:2644 vom 2020-06-22", url: "https://access.redhat.com/errata/RHSA-2020:2644", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:2646 vom 2020-06-22", url: "https://access.redhat.com/errata/RHSA-2020:2646", }, { category: "external", summary: "Juniper Security Advisory JSA11023 vom 2020-07-08", url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA11023", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:4751 vom 2020-11-04", url: "https://access.redhat.com/errata/RHSA-2020:4751", }, { category: "external", summary: "AVAYA Security Advisory ASA-2020-161 vom 2020-12-08", url: "https://downloads.avaya.com/css/P8/documents/101072834", }, ], source_lang: "en-US", title: "Apache HTTP Server: Mehrere Schwachstellen", tracking: { current_release_date: "2023-08-13T22:00:00.000+00:00", generator: { date: "2024-08-15T17:57:00.275+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2023-2047", initial_release_date: "2019-04-02T22:00:00.000+00:00", revision_history: [ { date: "2019-04-02T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2019-04-03T22:00:00.000+00:00", number: "2", summary: "Neue Updates von Debian und Fedora aufgenommen", }, { date: "2019-04-04T22:00:00.000+00:00", number: "3", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2019-04-04T22:00:00.000+00:00", number: "4", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2019-04-04T22:00:00.000+00:00", number: "5", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2019-04-07T22:00:00.000+00:00", number: "6", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2019-04-10T22:00:00.000+00:00", number: "7", summary: "Neue Updates von Ubuntu und Arch Linux aufgenommen", }, { date: "2019-04-11T22:00:00.000+00:00", number: "8", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2019-04-14T22:00:00.000+00:00", number: "9", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2019-04-22T22:00:00.000+00:00", number: "10", summary: "Referenz(en) aufgenommen: GLSA/201904-20", }, { date: "2019-05-06T22:00:00.000+00:00", number: "11", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2019-05-16T22:00:00.000+00:00", number: "12", summary: "Exploit aufgenommen", }, { date: "2019-05-23T22:00:00.000+00:00", number: "13", summary: "Referenz(en) aufgenommen: FEDORA-2019-B99E48E883, FEDORA-2019-08E57D15FD", }, { date: "2019-05-30T22:00:00.000+00:00", number: "14", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2019-05-30T22:00:00.000+00:00", number: "15", summary: "Referenz(en) aufgenommen: FEDORA-2019-C7187E6DC7", }, { date: "2019-06-02T22:00:00.000+00:00", number: "16", summary: "Schreibfehler korrigiert", }, { date: "2019-06-06T22:00:00.000+00:00", number: "17", summary: "Neue Updates von NetApp aufgenommen", }, { date: "2019-06-18T22:00:00.000+00:00", number: "18", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2019-06-24T22:00:00.000+00:00", number: "19", summary: "Neue Updates von NetApp aufgenommen", }, { date: "2019-08-06T22:00:00.000+00:00", number: "20", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2019-08-25T22:00:00.000+00:00", number: "21", summary: "Neue Updates von HP aufgenommen", }, { date: "2019-08-29T22:00:00.000+00:00", number: "22", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2019-09-17T22:00:00.000+00:00", number: "23", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2019-09-18T22:00:00.000+00:00", number: "24", summary: "Neue Updates von CentOS aufgenommen", }, { date: "2019-11-05T23:00:00.000+00:00", number: "25", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2019-11-20T23:00:00.000+00:00", number: "26", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2019-12-09T23:00:00.000+00:00", number: "27", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2020-01-27T23:00:00.000+00:00", number: "28", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2020-06-22T22:00:00.000+00:00", number: "29", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2020-07-08T22:00:00.000+00:00", number: "30", summary: "Neue Updates von Juniper aufgenommen", }, { date: "2020-11-03T23:00:00.000+00:00", number: "31", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2020-12-09T23:00:00.000+00:00", number: "32", summary: "Neue Updates von AVAYA aufgenommen", }, { date: "2023-08-13T22:00:00.000+00:00", number: "33", summary: "Neue Updates von HP aufgenommen", }, ], status: "final", version: "33", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Apache HTTP Server < 2.4.39", product: { name: "Apache HTTP Server < 2.4.39", product_id: "T013862", product_identification_helper: { cpe: "cpe:/a:apache:http_server:2.4.39", }, }, }, ], category: "vendor", name: "Apache", }, { branches: [ { category: "product_name", name: "Avaya Aura Experience Portal", product: { name: "Avaya Aura Experience Portal", product_id: "T015519", product_identification_helper: { cpe: "cpe:/a:avaya:aura_experience_portal:-", }, }, }, ], category: "vendor", name: "Avaya", }, { branches: [ { category: "product_name", name: "Broadcom Brocade Switch", product: { name: "Broadcom Brocade Switch", product_id: "T015844", product_identification_helper: { cpe: "cpe:/h:brocade:switch:-", }, }, }, ], category: "vendor", name: "Broadcom", }, { branches: [ { category: "product_name", name: "Debian Linux", product: { name: "Debian Linux", product_id: "2951", product_identification_helper: { cpe: "cpe:/o:debian:debian_linux:-", }, }, }, ], category: "vendor", name: "Debian", }, { branches: [ { category: "product_name", name: "HPE HP-UX", product: { name: "HPE HP-UX", product_id: "4871", product_identification_helper: { cpe: "cpe:/o:hp:hp-ux:-", }, }, }, { category: "product_name", name: "HPE Switch", product: { name: "HPE Switch", product_id: "T005119", product_identification_helper: { cpe: "cpe:/h:hp:switch:-", }, }, }, ], category: "vendor", name: "HPE", }, { branches: [ { category: "product_name", name: "Juniper Junos Space < 20.1R1", product: { name: "Juniper Junos Space < 20.1R1", product_id: "T016874", product_identification_helper: { cpe: "cpe:/a:juniper:junos_space:20.1r1", }, }, }, ], category: "vendor", name: "Juniper", }, { branches: [ { category: "product_name", name: "NetApp Data ONTAP", product: { name: "NetApp Data ONTAP", product_id: "7654", product_identification_helper: { cpe: "cpe:/a:netapp:data_ontap:-", }, }, }, ], category: "vendor", name: "NetApp", }, { branches: [ { category: "product_name", name: "Open Source Arch Linux", product: { name: "Open Source Arch Linux", product_id: "T013312", product_identification_helper: { cpe: "cpe:/o:archlinux:archlinux:-", }, }, }, { category: "product_name", name: "Open Source CentOS", product: { name: "Open Source CentOS", product_id: "1727", product_identification_helper: { cpe: "cpe:/o:centos:centos:-", }, }, }, ], category: "vendor", name: "Open Source", }, { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux", product: { name: "Red Hat Enterprise Linux", product_id: "67646", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:-", }, }, }, ], category: "vendor", name: "Red Hat", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2019-0196", notes: [ { category: "description", text: "Es existiert eine Schwachstelle im Apache HTTP Server. In mod_http2 besteht ein read-after-free Fehler in einem String Vergleich. Ein entfernter anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service zu verursachen.", }, ], product_status: { known_affected: [ "T015519", "2951", "T002207", "67646", "4871", "T000126", "7654", "T015844", "T013312", "T005119", "1727", ], }, release_date: "2019-04-02T22:00:00.000+00:00", title: "CVE-2019-0196", }, { cve: "CVE-2019-0197", notes: [ { category: "description", text: "Es existiert eine Schwachstelle im Apache HTTP Server. Diese besteht aufgrund unsachgemäß behandelter Upgrade request from http/1.1 auf http/2 in mod_http2. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service zu verursachen.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T015844", "T013312", "T005119", "1727", ], }, release_date: "2019-04-02T22:00:00.000+00:00", title: "CVE-2019-0197", }, { cve: "CVE-2019-0211", notes: [ { category: "description", text: "Es existiert eine Schwachstelle im Apache HTTP Server. Unter bestimmten Umständen kann Code, der in weniger privilegierten Kindprozessen oder Threads ausgeführt wird, beliebigen Code mit den Privilegien des übergeordneten Prozesses ausführen. Ein lokaler Angreifer kann diese Schwachstelle durch Manipulation des Scoreboards ausnutzen, um seine Rechte zu erweitern.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T015844", "T013312", "T005119", "1727", ], }, release_date: "2019-04-02T22:00:00.000+00:00", title: "CVE-2019-0211", }, { cve: "CVE-2019-0215", notes: [ { category: "description", text: "Es existiert eine Schwachstelle im Apache HTTP Server. Diese besteht aufgrund eines Fehlers in mod_ssl bei der Verifizierung von Client-Zertifikaten. Ein authentisierter Angreifer kann diese Schwachstelle ausnutzen, um Zugriffsbeschränkungen zu umgehen.", }, ], product_status: { known_affected: [ "2951", "67646", "T015844", "T013312", "T005119", "1727", ], }, release_date: "2019-04-02T22:00:00.000+00:00", title: "CVE-2019-0215", }, { cve: "CVE-2019-0217", notes: [ { category: "description", text: "Es existiert eine Schwachstelle im Apache HTTP Server. Es besteht eine Race Condition in mod_auth_digest während der Ausführung in einem Thread-Server. Ein authentisierter Angreifer kann kann diese Schwachstelle ausnutzen, um konfigurierte Zugriffsbeschränkungen zu umgehen und sich mit einem anderen Benutzernamen zu authentifizieren.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T015844", "T013312", "T005119", "1727", ], }, release_date: "2019-04-02T22:00:00.000+00:00", title: "CVE-2019-0217", }, { cve: "CVE-2019-0220", notes: [ { category: "description", text: "Es existiert eine Schwachstelle im Apache HTTP Server. Diese besteht wegen einer unsachgemäßen Behandlung von regulären Ausdrücken in der Pfadkomponente einer Request-URL. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service zu verursachen.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "7654", "T015844", "T013312", "T005119", "1727", ], }, release_date: "2019-04-02T22:00:00.000+00:00", title: "CVE-2019-0220", }, ], }
wid-sec-w-2023-2047
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Apache ist ein Webserver für verschiedene Plattformen.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen im Apache HTTP Server ausnutzen, um seine Rechte zu erweitern, Sicherheitsrestriktionen zu umgehen oder um einen Denial of Service Angriff durchzuführen.", title: "Angriff", }, { category: "general", text: "- UNIX\n- Linux\n- Windows\n- NetApp Appliance", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2023-2047 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2019/wid-sec-w-2023-2047.json", }, { category: "self", summary: "WID-SEC-2023-2047 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2047", }, { category: "external", summary: "HPE Securi+y Bulletin", url: "https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-hpesbst04494en_us", }, { category: "external", summary: "Einträge in der OSS Mailing Liste vom 2019-04-02", url: "https://seclists.org/oss-sec/2019/q2/0", }, { category: "external", summary: "Einträge in der OSS Mailing Liste vom 2019-04-02", url: "https://seclists.org/oss-sec/2019/q2/1", }, { category: "external", summary: "Einträge in der OSS Mailing Liste vom 2019-04-02", url: "https://seclists.org/oss-sec/2019/q2/2", }, { category: "external", summary: "Einträge in der OSS Mailing Liste vom 2019-04-02", url: "https://seclists.org/oss-sec/2019/q2/3", }, { category: "external", summary: "Einträge in der OSS Mailing Liste vom 2019-04-02", url: "https://seclists.org/oss-sec/2019/q2/4", }, { category: "external", summary: "Einträge in der OSS Mailing Liste vom 2019-04-02", url: "https://seclists.org/oss-sec/2019/q2/5", }, { category: "external", summary: "Apache Release Notes Stand 2019-04-02", url: "https://httpd.apache.org/security/vulnerabilities_24.html", }, { category: "external", summary: "Debian Security Advisory DSA-4422 vom 2019-04-04 vom 2019-04-03", url: "https://lists.debian.org/debian-security-announce/2019/msg00066.html", }, { category: "external", summary: "Ubuntu Security Notices USN-3937-1 vom 2019-04-04", url: "https://usn.ubuntu.com/3937-1/", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:0878-1 vom 2019-04-04", url: "https://www.suse.com/de-de/support/update/announcement/2019/suse-su-20190878-1/", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:0873-1 vom 2019-04-04", url: "http://lists.suse.com/pipermail/sle-security-updates/2019-April/005295.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:0889-1 vom 2019-04-05", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20190889-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:0888-1 vom 2019-04-05", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20190888-1.html", }, { category: "external", summary: "Ubuntu Security Notice USN-3937-2 vom 2019-04-10", url: "https://usn.ubuntu.com/3937-2/", }, { category: "external", summary: "Arch Linux Security Advisory ASA-201904-3 vom 2019-04-05", url: "https://security.archlinux.org/ASA-201904-3", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:0746 vom 2019-04-11", url: "https://access.redhat.com/errata/RHSA-2019:0746", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:0888-2 vom 2019-04-12", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20190888-2.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:0251 vom 2020-01-27", url: "https://access.redhat.com/errata/RHSA-2020:0251", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:0250 vom 2020-01-27", url: "https://access.redhat.com/errata/RHSA-2020:0250", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:0980 vom 2019-05-07", url: "https://access.redhat.com/errata/RHSA-2019:0980", }, { category: "external", summary: "Exploit für CVE-2019-0211 vom 2019-05-16", url: "https://github.com/cfreal/exploits/tree/master/CVE-2019-0211-apache", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:1296 vom 2019-05-30", url: "https://access.redhat.com/errata/RHSA-2019:1296", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:1297 vom 2019-05-30", url: "https://access.redhat.com/errata/RHSA-2019:1297", }, { category: "external", summary: "NetApp Security Advisory NTAP-20190423-0001 vom 2019-06-06", url: "https://security.netapp.com/advisory/ntap-20190423-0001/", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:1543 vom 2019-06-19", url: "https://access.redhat.com/errata/RHSA-2019:1543", }, { category: "external", summary: "NetApp Security Advisory NTAP-20190625-0007 vom 2019-06-25", url: "https://security.netapp.com/advisory/ntap-20190625-0007/", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2343 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2343", }, { category: "external", summary: "HP SECURITY BULLETIN hpesbux03950en_us vom 2019-08-22", url: "https://support.hpe.com/hpsc/doc/public/display?docId=hpesbux03950en_us", }, { category: "external", summary: "Ubuntu Security Notice USN-4113-1 vom 2019-08-30", url: "https://usn.ubuntu.com/4113-1/", }, { category: "external", summary: "Ubuntu Security Notice USN-4113-2 vom 2019-09-17", url: "https://usn.ubuntu.com/4113-2/", }, { category: "external", summary: "CentOS Security Advisory CESA-2019:2343 vom 2019-09-18", url: "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-2343-Moderate-CentOS-7-httpd-Security-Update-tp4645680.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:3436 vom 2019-11-05", url: "https://access.redhat.com/errata/RHSA-2019:3436", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:3933 vom 2019-11-20", url: "https://access.redhat.com/errata/RHSA-2019:3933", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:3935 vom 2019-11-20", url: "https://access.redhat.com/errata/RHSA-2019:3935", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:3932 vom 2019-11-20", url: "https://access.redhat.com/errata/RHSA-2019:3932", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:4126 vom 2019-12-10", url: "https://access.redhat.com/errata/RHSA-2019:4126", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:2644 vom 2020-06-22", url: "https://access.redhat.com/errata/RHSA-2020:2644", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:2646 vom 2020-06-22", url: "https://access.redhat.com/errata/RHSA-2020:2646", }, { category: "external", summary: "Juniper Security Advisory JSA11023 vom 2020-07-08", url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA11023", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:4751 vom 2020-11-04", url: "https://access.redhat.com/errata/RHSA-2020:4751", }, { category: "external", summary: "AVAYA Security Advisory ASA-2020-161 vom 2020-12-08", url: "https://downloads.avaya.com/css/P8/documents/101072834", }, ], source_lang: "en-US", title: "Apache HTTP Server: Mehrere Schwachstellen", tracking: { current_release_date: "2023-08-13T22:00:00.000+00:00", generator: { date: "2024-08-15T17:57:00.275+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2023-2047", initial_release_date: "2019-04-02T22:00:00.000+00:00", revision_history: [ { date: "2019-04-02T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2019-04-03T22:00:00.000+00:00", number: "2", summary: "Neue Updates von Debian und Fedora aufgenommen", }, { date: "2019-04-04T22:00:00.000+00:00", number: "3", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2019-04-04T22:00:00.000+00:00", number: "4", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2019-04-04T22:00:00.000+00:00", number: "5", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2019-04-07T22:00:00.000+00:00", number: "6", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2019-04-10T22:00:00.000+00:00", number: "7", summary: "Neue Updates von Ubuntu und Arch Linux aufgenommen", }, { date: "2019-04-11T22:00:00.000+00:00", number: "8", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2019-04-14T22:00:00.000+00:00", number: "9", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2019-04-22T22:00:00.000+00:00", number: "10", summary: "Referenz(en) aufgenommen: GLSA/201904-20", }, { date: "2019-05-06T22:00:00.000+00:00", number: "11", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2019-05-16T22:00:00.000+00:00", number: "12", summary: "Exploit aufgenommen", }, { date: "2019-05-23T22:00:00.000+00:00", number: "13", summary: "Referenz(en) aufgenommen: FEDORA-2019-B99E48E883, FEDORA-2019-08E57D15FD", }, { date: "2019-05-30T22:00:00.000+00:00", number: "14", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2019-05-30T22:00:00.000+00:00", number: "15", summary: "Referenz(en) aufgenommen: FEDORA-2019-C7187E6DC7", }, { date: "2019-06-02T22:00:00.000+00:00", number: "16", summary: "Schreibfehler korrigiert", }, { date: "2019-06-06T22:00:00.000+00:00", number: "17", summary: "Neue Updates von NetApp aufgenommen", }, { date: "2019-06-18T22:00:00.000+00:00", number: "18", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2019-06-24T22:00:00.000+00:00", number: "19", summary: "Neue Updates von NetApp aufgenommen", }, { date: "2019-08-06T22:00:00.000+00:00", number: "20", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2019-08-25T22:00:00.000+00:00", number: "21", summary: "Neue Updates von HP aufgenommen", }, { date: "2019-08-29T22:00:00.000+00:00", number: "22", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2019-09-17T22:00:00.000+00:00", number: "23", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2019-09-18T22:00:00.000+00:00", number: "24", summary: "Neue Updates von CentOS aufgenommen", }, { date: "2019-11-05T23:00:00.000+00:00", number: "25", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2019-11-20T23:00:00.000+00:00", number: "26", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2019-12-09T23:00:00.000+00:00", number: "27", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2020-01-27T23:00:00.000+00:00", number: "28", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2020-06-22T22:00:00.000+00:00", number: "29", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2020-07-08T22:00:00.000+00:00", number: "30", summary: "Neue Updates von Juniper aufgenommen", }, { date: "2020-11-03T23:00:00.000+00:00", number: "31", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2020-12-09T23:00:00.000+00:00", number: "32", summary: "Neue Updates von AVAYA aufgenommen", }, { date: "2023-08-13T22:00:00.000+00:00", number: "33", summary: "Neue Updates von HP aufgenommen", }, ], status: "final", version: "33", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Apache HTTP Server < 2.4.39", product: { name: "Apache HTTP Server < 2.4.39", product_id: "T013862", product_identification_helper: { cpe: "cpe:/a:apache:http_server:2.4.39", }, }, }, ], category: "vendor", name: "Apache", }, { branches: [ { category: "product_name", name: "Avaya Aura Experience Portal", product: { name: "Avaya Aura Experience Portal", product_id: "T015519", product_identification_helper: { cpe: "cpe:/a:avaya:aura_experience_portal:-", }, }, }, ], category: "vendor", name: "Avaya", }, { branches: [ { category: "product_name", name: "Broadcom Brocade Switch", product: { name: "Broadcom Brocade Switch", product_id: "T015844", product_identification_helper: { cpe: "cpe:/h:brocade:switch:-", }, }, }, ], category: "vendor", name: "Broadcom", }, { branches: [ { category: "product_name", name: "Debian Linux", product: { name: "Debian Linux", product_id: "2951", product_identification_helper: { cpe: "cpe:/o:debian:debian_linux:-", }, }, }, ], category: "vendor", name: "Debian", }, { branches: [ { category: "product_name", name: "HPE HP-UX", product: { name: "HPE HP-UX", product_id: "4871", product_identification_helper: { cpe: "cpe:/o:hp:hp-ux:-", }, }, }, { category: "product_name", name: "HPE Switch", product: { name: "HPE Switch", product_id: "T005119", product_identification_helper: { cpe: "cpe:/h:hp:switch:-", }, }, }, ], category: "vendor", name: "HPE", }, { branches: [ { category: "product_name", name: "Juniper Junos Space < 20.1R1", product: { name: "Juniper Junos Space < 20.1R1", product_id: "T016874", product_identification_helper: { cpe: "cpe:/a:juniper:junos_space:20.1r1", }, }, }, ], category: "vendor", name: "Juniper", }, { branches: [ { category: "product_name", name: "NetApp Data ONTAP", product: { name: "NetApp Data ONTAP", product_id: "7654", product_identification_helper: { cpe: "cpe:/a:netapp:data_ontap:-", }, }, }, ], category: "vendor", name: "NetApp", }, { branches: [ { category: "product_name", name: "Open Source Arch Linux", product: { name: "Open Source Arch Linux", product_id: "T013312", product_identification_helper: { cpe: "cpe:/o:archlinux:archlinux:-", }, }, }, { category: "product_name", name: "Open Source CentOS", product: { name: "Open Source CentOS", product_id: "1727", product_identification_helper: { cpe: "cpe:/o:centos:centos:-", }, }, }, ], category: "vendor", name: "Open Source", }, { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux", product: { name: "Red Hat Enterprise Linux", product_id: "67646", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:-", }, }, }, ], category: "vendor", name: "Red Hat", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2019-0196", notes: [ { category: "description", text: "Es existiert eine Schwachstelle im Apache HTTP Server. In mod_http2 besteht ein read-after-free Fehler in einem String Vergleich. Ein entfernter anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service zu verursachen.", }, ], product_status: { known_affected: [ "T015519", "2951", "T002207", "67646", "4871", "T000126", "7654", "T015844", "T013312", "T005119", "1727", ], }, release_date: "2019-04-02T22:00:00.000+00:00", title: "CVE-2019-0196", }, { cve: "CVE-2019-0197", notes: [ { category: "description", text: "Es existiert eine Schwachstelle im Apache HTTP Server. Diese besteht aufgrund unsachgemäß behandelter Upgrade request from http/1.1 auf http/2 in mod_http2. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service zu verursachen.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T015844", "T013312", "T005119", "1727", ], }, release_date: "2019-04-02T22:00:00.000+00:00", title: "CVE-2019-0197", }, { cve: "CVE-2019-0211", notes: [ { category: "description", text: "Es existiert eine Schwachstelle im Apache HTTP Server. Unter bestimmten Umständen kann Code, der in weniger privilegierten Kindprozessen oder Threads ausgeführt wird, beliebigen Code mit den Privilegien des übergeordneten Prozesses ausführen. Ein lokaler Angreifer kann diese Schwachstelle durch Manipulation des Scoreboards ausnutzen, um seine Rechte zu erweitern.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T015844", "T013312", "T005119", "1727", ], }, release_date: "2019-04-02T22:00:00.000+00:00", title: "CVE-2019-0211", }, { cve: "CVE-2019-0215", notes: [ { category: "description", text: "Es existiert eine Schwachstelle im Apache HTTP Server. Diese besteht aufgrund eines Fehlers in mod_ssl bei der Verifizierung von Client-Zertifikaten. Ein authentisierter Angreifer kann diese Schwachstelle ausnutzen, um Zugriffsbeschränkungen zu umgehen.", }, ], product_status: { known_affected: [ "2951", "67646", "T015844", "T013312", "T005119", "1727", ], }, release_date: "2019-04-02T22:00:00.000+00:00", title: "CVE-2019-0215", }, { cve: "CVE-2019-0217", notes: [ { category: "description", text: "Es existiert eine Schwachstelle im Apache HTTP Server. Es besteht eine Race Condition in mod_auth_digest während der Ausführung in einem Thread-Server. Ein authentisierter Angreifer kann kann diese Schwachstelle ausnutzen, um konfigurierte Zugriffsbeschränkungen zu umgehen und sich mit einem anderen Benutzernamen zu authentifizieren.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "T015844", "T013312", "T005119", "1727", ], }, release_date: "2019-04-02T22:00:00.000+00:00", title: "CVE-2019-0217", }, { cve: "CVE-2019-0220", notes: [ { category: "description", text: "Es existiert eine Schwachstelle im Apache HTTP Server. Diese besteht wegen einer unsachgemäßen Behandlung von regulären Ausdrücken in der Pfadkomponente einer Request-URL. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service zu verursachen.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "7654", "T015844", "T013312", "T005119", "1727", ], }, release_date: "2019-04-02T22:00:00.000+00:00", title: "CVE-2019-0220", }, ], }
fkie_cve-2019-0211
Vulnerability from fkie_nvd
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
{ cisaActionDue: "2022-05-03", cisaExploitAdd: "2021-11-03", cisaRequiredAction: "Apply updates per vendor instructions.", cisaVulnerabilityName: "Apache HTTP Server Privilege Escalation Vulnerability", configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*", matchCriteriaId: "3AF858A9-701E-44F6-8DB1-36B76C40733A", versionEndIncluding: "2.4.38", versionStartIncluding: "2.4.17", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*", matchCriteriaId: "DC1BD7B7-6D88-42B8-878E-F1318CA5FCAF", vulnerable: true, }, { criteria: "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", matchCriteriaId: "D100F7CE-FC64-4CC6-852A-6136D72DA419", vulnerable: true, }, { criteria: "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", matchCriteriaId: "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", matchCriteriaId: "815D70A8-47D3-459C-A32C-9FEACA0659D1", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", matchCriteriaId: "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*", matchCriteriaId: "B3293E55-5506-4587-A318-D1734F781C09", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", matchCriteriaId: "07C312A0-CD2C-4B9C-B064-6409B25C278F", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", matchCriteriaId: "F1E78106-58E6-4D59-990F-75DA575BFAD9", vulnerable: true, }, { criteria: "cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*", matchCriteriaId: "5F65DAB0-3DAD-49FF-BC73-3581CC3D5BF3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*", matchCriteriaId: "3FA5E22C-489B-4C5F-A5F3-C03F45CA8811", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*", matchCriteriaId: "A2466282-51AB-478D-9FF4-FA524265ED2E", vulnerable: true, }, { criteria: "cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*", matchCriteriaId: "2F87326E-0B56-4356-A889-73D026DB1D4B", vulnerable: true, }, { criteria: "cpe:2.3:a:redhat:openshift_container_platform_for_power:3.11_ppc64le:*:*:*:*:*:*:*", matchCriteriaId: "6005C278-5443-42EA-9D16-220FBF17FC95", vulnerable: true, }, { criteria: "cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*", matchCriteriaId: "9D7EE4B6-A6EC-4B9B-91DF-79615796673F", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "F4CFF558-3C47-480D-A2F0-BABF26042943", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*", matchCriteriaId: "92BC9265-6959-4D37-BE5E-8C45E98992F8", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*", matchCriteriaId: "831F0F47-3565-4763-B16F-C87B1FF2035E", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*", matchCriteriaId: "0E3F09B5-569F-4C58-9FCA-3C0953D107B5", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*", matchCriteriaId: "6C3741B8-851F-475D-B428-523F4F722350", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*", matchCriteriaId: "62C31522-0A17-4025-B269-855C7F4B45C2", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.0_aarch64:*:*:*:*:*:*:*", matchCriteriaId: "5A47EF78-A5B6-4B89-8B74-EEB0647C549F", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.1_aarch64:*:*:*:*:*:*:*", matchCriteriaId: "2FF1A19F-8A15-471A-B496-E1B4BA788356", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.2_aarch64:*:*:*:*:*:*:*", matchCriteriaId: "EAD7EC1D-5979-42E6-9DA6-355B53431F3B", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.4_aarch64:*:*:*:*:*:*:*", matchCriteriaId: "AE49DCA5-1B01-4478-A1E9-2E87E948A0C1", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.6_aarch64:*:*:*:*:*:*:*", matchCriteriaId: "37B7CE5C-BFEA-4F96-9759-D511EF189059", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.8_aarch64:*:*:*:*:*:*:*", matchCriteriaId: "213593D4-EB5A-4A1B-BDF3-3F043C5F6A6C", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0_s390x:*:*:*:*:*:*:*", matchCriteriaId: "32AF225E-94C0-4D07-900C-DD868C05F554", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.1_s390x:*:*:*:*:*:*:*", matchCriteriaId: "00966AC5-1C84-4B5F-9665-5E99D4AEB3A2", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2_s390x:*:*:*:*:*:*:*", matchCriteriaId: "0D04F433-CB52-4F3D-8711-39D3BDA27FE3", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4_s390x:*:*:*:*:*:*:*", matchCriteriaId: "07332196-7E36-4E95-81BC-DD959629C1BE", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.6_s390x:*:*:*:*:*:*:*", matchCriteriaId: "B758EDC9-6421-422C-899E-A273D2936D8E", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.8_s390x:*:*:*:*:*:*:*", matchCriteriaId: "22C65F53-D624-48A9-A9B7-4C78A31E19F9", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0_ppc64le:*:*:*:*:*:*:*", matchCriteriaId: "23D471AC-7DCA-4425-AD91-E5D928753A8C", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.1_ppc64le:*:*:*:*:*:*:*", matchCriteriaId: "F505D098-2143-4218-A528-D92BFC017FFD", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2_ppc64le:*:*:*:*:*:*:*", matchCriteriaId: "96E5CEC7-D3B9-4895-96E9-E26D2ACF1AE3", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4_ppc64le:*:*:*:*:*:*:*", matchCriteriaId: "BB28CF82-799F-4A6E-B1DB-0AB423E6C05D", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.6_ppc64le:*:*:*:*:*:*:*", matchCriteriaId: "D9C30C59-07F7-4CCE-B057-052ECCD36DB8", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.8_ppc64le:*:*:*:*:*:*:*", matchCriteriaId: "F91F9255-4EE1-43C7-8831-D2B6C228BFD9", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*", matchCriteriaId: "6897676D-53F9-45B3-B27F-7FF9A4C58D33", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*", matchCriteriaId: "E28F226A-CBC7-4A32-BE58-398FA5B42481", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*", matchCriteriaId: "76C24D94-834A-4E9D-8F73-624AFA99AAA2", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*", matchCriteriaId: "B09ACF2D-D83F-4A86-8185-9569605D8EE1", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*", matchCriteriaId: "AC10D919-57FD-4725-B8D2-39ECB476902F", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*", matchCriteriaId: "1272DF03-7674-4BD4-8E64-94004B195448", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8:*:*:*:*:*:*:*", matchCriteriaId: "F1CA946D-1665-4874-9D41-C7D963DD1F56", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.0:*:*:*:*:*:*:*", matchCriteriaId: "B3D1213C-EB9C-4475-9268-86AD947D256E", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*", matchCriteriaId: "3ADDB02D-F377-43CE-B0A8-FC6C7D5CFABC", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*", matchCriteriaId: "E881C927-DF96-4D2E-9887-FF12E456B1FB", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.6:*:*:*:*:*:*:*", matchCriteriaId: "FB096D5D-E8F6-4164-8B76-0217B7151D30", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.8:*:*:*:*:*:*:*", matchCriteriaId: "01ED4F33-EBE7-4C04-8312-3DA580EFFB68", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:oracle:communications_session_report_manager:8.0.0:*:*:*:*:*:*:*", matchCriteriaId: "7DDF6809-53A7-4F7D-9FA8-B522BE8F7A21", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:communications_session_report_manager:8.1.0:*:*:*:*:*:*:*", matchCriteriaId: "AA86A15F-FAB8-4DF5-95AC-DA3D1CF7A720", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:communications_session_report_manager:8.1.1:*:*:*:*:*:*:*", matchCriteriaId: "DB43DFD4-D058-4001-BD19-488E059F4532", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:communications_session_report_manager:8.2.0:*:*:*:*:*:*:*", matchCriteriaId: "086E2E5C-44EB-4C07-B298-C04189533996", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:communications_session_route_manager:8.0.0:*:*:*:*:*:*:*", matchCriteriaId: "4B042935-BC42-4CA8-9379-7F0F894F9653", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:communications_session_route_manager:8.1.0:*:*:*:*:*:*:*", matchCriteriaId: "3B374F86-4EC8-4797-A8C3-5C1FF1DFC9F8", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:communications_session_route_manager:8.1.1:*:*:*:*:*:*:*", matchCriteriaId: "5682DAEB-3810-4541-833A-568C868BCE0B", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:communications_session_route_manager:8.2.0:*:*:*:*:*:*:*", matchCriteriaId: "01BC9AED-F81D-4344-AD97-EEF19B6EA8C7", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*", matchCriteriaId: "AB654DFA-FEF9-4D00-ADB0-F3F2B6ACF13E", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*", matchCriteriaId: "37209C6F-EF99-4D21-9608-B3A06D283D24", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*", matchCriteriaId: "DFC79B17-E9D2-44D5-93ED-2F959E7A3D43", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*", matchCriteriaId: "82EA4BA7-C38B-4AF3-8914-9E3D089EBDD4", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*", matchCriteriaId: "B9C9BC66-FA5F-4774-9BDA-7AB88E2839C4", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*", matchCriteriaId: "7F69B9A5-F21B-4904-9F27-95C0F7A628E3", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:retail_xstore_point_of_service:7.0:*:*:*:*:*:*:*", matchCriteriaId: "2F87FC90-16D0-4051-8280-B0DD4441F10B", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:retail_xstore_point_of_service:7.1:*:*:*:*:*:*:*", matchCriteriaId: "A0ED83E3-E6BF-4EAA-AF8F-33485A88A218", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected.", }, { lang: "es", value: "En Apache HTTP Server 2.4, versiones 2.4.17 a 2.4.38, con el evento MPM, worker o prefork, el código ejecutándose en procesos hijo (o hilos) menos privilegiados (incluyendo scripts ejecutados por un intérprete de scripts en proceso) podría ejecutar código arbitrario con los privilegios del proceso padre (normalmente root) manipulando el marcador. Los sistemas que no son Unix no se ven afectados.", }, ], id: "CVE-2019-0211", lastModified: "2025-04-04T15:34:11.407", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2019-04-08T22:29:00.387", references: [ { source: "security@apache.org", tags: [ "Broken Link", "Mailing List", "Release Notes", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00051.html", }, { source: "security@apache.org", tags: [ "Broken Link", "Mailing List", "Release Notes", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00061.html", }, { source: "security@apache.org", tags: [ "Broken Link", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html", }, { source: "security@apache.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/152386/Apache-2.4.38-Root-Privilege-Escalation.html", }, { source: "security@apache.org", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/152415/Slackware-Security-Advisory-httpd-Updates.html", }, { source: "security@apache.org", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/152441/CARPE-DIEM-Apache-2.4.x-Local-Privilege-Escalation.html", }, { source: "security@apache.org", tags: [ "Broken Link", "Vendor Advisory", ], url: "http://www.apache.org/dist/httpd/CHANGES_2.4.39", }, { source: "security@apache.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2019/04/02/3", }, { source: "security@apache.org", tags: [ "Mailing List", ], url: "http://www.openwall.com/lists/oss-security/2019/07/26/7", }, { source: "security@apache.org", tags: [ "Broken Link", "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/107666", }, { source: "security@apache.org", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHBA-2019:0959", }, { source: "security@apache.org", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2019:0746", }, { source: "security@apache.org", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2019:0980", }, { source: "security@apache.org", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2019:1296", }, { source: "security@apache.org", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2019:1297", }, { source: "security@apache.org", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2019:1543", }, { source: "security@apache.org", tags: [ "Vendor Advisory", ], url: "https://httpd.apache.org/security/vulnerabilities_24.html", }, { source: "security@apache.org", tags: [ "Mailing List", ], url: "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E", }, { source: "security@apache.org", tags: [ "Mailing List", ], url: "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E", }, { source: "security@apache.org", tags: [ "Mailing List", ], url: "https://lists.apache.org/thread.html/890507b85c30adf133216b299cc35cd8cd0346a885acfc671c04694e%40%3Cdev.community.apache.org%3E", }, { source: "security@apache.org", tags: [ "Mailing List", ], url: "https://lists.apache.org/thread.html/b1613d44ec364c87bb7ee8c5939949f9b061c05c06e0e90098ebf7aa%40%3Cusers.httpd.apache.org%3E", }, { source: "security@apache.org", tags: [ "Mailing List", ], url: "https://lists.apache.org/thread.html/b2bdb308dc015e771ba79c0586b2de6fb50caa98b109833f5d4daf28%40%3Cdev.community.apache.org%3E", }, { source: "security@apache.org", tags: [ "Mailing List", ], url: "https://lists.apache.org/thread.html/de881a130bc9cb2f3a9ff220784520556884fb8ea80e69400a45509e%40%3Cdev.community.apache.org%3E", }, { source: "security@apache.org", tags: [ "Mailing List", ], url: "https://lists.apache.org/thread.html/fd110f4ace2d8364c7d9190e1993cde92f79e4eb85576ed9285686ac%40%3Ccvs.httpd.apache.org%3E", }, { source: "security@apache.org", tags: [ "Mailing List", ], url: "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E", }, { source: "security@apache.org", tags: [ "Mailing List", ], url: "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E", }, { source: "security@apache.org", tags: [ "Mailing List", ], url: "https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E", }, { source: "security@apache.org", tags: [ "Mailing List", ], url: "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E", }, { source: "security@apache.org", tags: [ "Mailing List", "Patch", ], url: "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E", }, { source: "security@apache.org", tags: [ "Mailing List", ], url: "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E", }, { source: "security@apache.org", tags: [ "Mailing List", ], url: "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E", }, { source: "security@apache.org", tags: [ "Mailing List", ], url: "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E", }, { source: "security@apache.org", tags: [ "Mailing List", ], url: "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E", }, { source: "security@apache.org", tags: [ "Mailing List", ], url: "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E", }, { source: "security@apache.org", tags: [ "Mailing List", ], url: "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E", }, { source: "security@apache.org", tags: [ "Release Notes", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/", }, { source: "security@apache.org", tags: [ "Release Notes", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/", }, { source: "security@apache.org", tags: [ "Release Notes", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/", }, { source: "security@apache.org", tags: [ "Mailing List", "Patch", "Third Party Advisory", ], url: "https://seclists.org/bugtraq/2019/Apr/16", }, { source: "security@apache.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://seclists.org/bugtraq/2019/Apr/5", }, { source: "security@apache.org", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201904-20", }, { source: "security@apache.org", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20190423-0001/", }, { source: "security@apache.org", tags: [ "Third Party Advisory", ], url: "https://support.f5.com/csp/article/K32957101", }, { source: "security@apache.org", tags: [ "Third Party Advisory", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us", }, { source: "security@apache.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3937-1/", }, { source: "security@apache.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://www.debian.org/security/2019/dsa-4422", }, { source: "security@apache.org", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "https://www.exploit-db.com/exploits/46676/", }, { source: "security@apache.org", tags: [ "Patch", "Third Party Advisory", ], url: "https://www.oracle.com/security-alerts/cpuapr2020.html", }, { source: "security@apache.org", tags: [ "Patch", "Third Party Advisory", ], url: "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html", }, { source: "security@apache.org", tags: [ "Patch", "Third Party Advisory", ], url: "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", }, { source: "security@apache.org", tags: [ "Third Party Advisory", ], url: "https://www.synology.com/security/advisory/Synology_SA_19_14", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", "Mailing List", "Release Notes", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00051.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", "Mailing List", "Release Notes", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00061.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/152386/Apache-2.4.38-Root-Privilege-Escalation.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/152415/Slackware-Security-Advisory-httpd-Updates.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/152441/CARPE-DIEM-Apache-2.4.x-Local-Privilege-Escalation.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", "Vendor Advisory", ], url: "http://www.apache.org/dist/httpd/CHANGES_2.4.39", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2019/04/02/3", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", ], url: "http://www.openwall.com/lists/oss-security/2019/07/26/7", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/107666", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHBA-2019:0959", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2019:0746", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2019:0980", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2019:1296", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2019:1297", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2019:1543", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://httpd.apache.org/security/vulnerabilities_24.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", ], url: "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", ], url: "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", ], url: "https://lists.apache.org/thread.html/890507b85c30adf133216b299cc35cd8cd0346a885acfc671c04694e%40%3Cdev.community.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", ], url: "https://lists.apache.org/thread.html/b1613d44ec364c87bb7ee8c5939949f9b061c05c06e0e90098ebf7aa%40%3Cusers.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", ], url: "https://lists.apache.org/thread.html/b2bdb308dc015e771ba79c0586b2de6fb50caa98b109833f5d4daf28%40%3Cdev.community.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", ], url: "https://lists.apache.org/thread.html/de881a130bc9cb2f3a9ff220784520556884fb8ea80e69400a45509e%40%3Cdev.community.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", ], url: "https://lists.apache.org/thread.html/fd110f4ace2d8364c7d9190e1993cde92f79e4eb85576ed9285686ac%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", ], url: "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", ], url: "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", ], url: "https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", ], url: "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Patch", ], url: "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", ], url: "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", ], url: "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", ], url: "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", ], url: "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", ], url: "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", ], url: "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Patch", "Third Party Advisory", ], url: "https://seclists.org/bugtraq/2019/Apr/16", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://seclists.org/bugtraq/2019/Apr/5", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201904-20", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20190423-0001/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://support.f5.com/csp/article/K32957101", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3937-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://www.debian.org/security/2019/dsa-4422", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "https://www.exploit-db.com/exploits/46676/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://www.oracle.com/security-alerts/cpuapr2020.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.synology.com/security/advisory/Synology_SA_19_14", }, ], sourceIdentifier: "security@apache.org", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-416", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-416", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
opensuse-su-2019:1209-1
Vulnerability from csaf_opensuse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for apache2", title: "Title of the patch", }, { category: "description", text: "This update for apache2 fixes the following issues:\n\n* CVE-2019-0211: A flaw in the Apache HTTP Server allowed less-privileged child\n processes or threads to execute arbitrary code with the privileges of the\n parent process. Attackers with control over CGI scripts or extension modules\n run by the server could have abused this issue to potentially gain super user\n privileges. [bsc#1131233]\n\n* CVE-2019-0220: The Apache HTTP server did not use a consistent strategy for\n URL normalization throughout all of its components. In particular,\n consecutive slashes were not always collapsed. Attackers could potentially\n abuse these inconsistencies to by-pass access control mechanisms and thus\n gain unauthorized access to protected parts of the service. [bsc#1131241]\n\n* CVE-2019-0217: A race condition in Apache's 'mod_auth_digest' when running in\n a threaded server could have allowed users with valid credentials to\n authenticate using another username, bypassing configured access control\n restrictions. [bsc#1131239]\n\n* CVE-2019-0197: When HTTP/2 support was enabled in the Apache server for a\n 'http' host or H2Upgrade was enabled for h2 on a 'https' host, an Upgrade\n request from http/1.1 to http/2 that was not the first request on a\n connection could lead to a misconfiguration and crash. This issue could have\n been abused to mount a denial-of-service attack. Servers that never enabled\n the h2 protocol or that only enabled it for https: and did not configure the\n 'H2Upgrade on' are unaffected. [bsc#1131245]\n\n* CVE-2019-0196: Through specially crafted network input the Apache's http/2\n request handler could be lead to access previously freed memory while\n determining the method of a request. This resulted in the request being\n misclassified and thus being processed incorrectly. [bsc#1131237]\n\n\nThis update was imported from the SUSE:SLE-15:Update update project.", title: "Description of the patch", }, { category: "details", text: "openSUSE-2019-1209", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_1209-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2019:1209-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RNLNPLSIVUYNHELCO7GMIQ3KIORYAK6L/#RNLNPLSIVUYNHELCO7GMIQ3KIORYAK6L", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2019:1209-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RNLNPLSIVUYNHELCO7GMIQ3KIORYAK6L/#RNLNPLSIVUYNHELCO7GMIQ3KIORYAK6L", }, { category: "self", summary: "SUSE Bug 1131233", url: "https://bugzilla.suse.com/1131233", }, { category: "self", summary: "SUSE Bug 1131237", url: "https://bugzilla.suse.com/1131237", }, { category: "self", summary: "SUSE Bug 1131239", url: "https://bugzilla.suse.com/1131239", }, { category: "self", summary: "SUSE Bug 1131241", url: "https://bugzilla.suse.com/1131241", }, { category: "self", summary: "SUSE Bug 1131245", url: "https://bugzilla.suse.com/1131245", }, { category: "self", summary: "SUSE CVE CVE-2019-0196 page", url: "https://www.suse.com/security/cve/CVE-2019-0196/", }, { category: "self", summary: "SUSE CVE CVE-2019-0197 page", url: "https://www.suse.com/security/cve/CVE-2019-0197/", }, { category: "self", summary: "SUSE CVE CVE-2019-0211 page", url: "https://www.suse.com/security/cve/CVE-2019-0211/", }, { category: "self", summary: "SUSE CVE CVE-2019-0217 page", url: "https://www.suse.com/security/cve/CVE-2019-0217/", }, { category: "self", summary: "SUSE CVE CVE-2019-0220 page", url: "https://www.suse.com/security/cve/CVE-2019-0220/", }, ], title: "Security update for apache2", tracking: { current_release_date: "2019-04-16T08:27:23Z", generator: { date: "2019-04-16T08:27:23Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2019:1209-1", initial_release_date: "2019-04-16T08:27:23Z", revision_history: [ { date: "2019-04-16T08:27:23Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "apache2-2.4.33-lp150.2.17.1.i586", product: { name: "apache2-2.4.33-lp150.2.17.1.i586", product_id: "apache2-2.4.33-lp150.2.17.1.i586", }, }, { category: "product_version", name: "apache2-devel-2.4.33-lp150.2.17.1.i586", product: { name: "apache2-devel-2.4.33-lp150.2.17.1.i586", product_id: "apache2-devel-2.4.33-lp150.2.17.1.i586", }, }, { category: "product_version", name: "apache2-event-2.4.33-lp150.2.17.1.i586", product: { name: "apache2-event-2.4.33-lp150.2.17.1.i586", product_id: "apache2-event-2.4.33-lp150.2.17.1.i586", }, }, { category: "product_version", name: "apache2-example-pages-2.4.33-lp150.2.17.1.i586", product: { name: "apache2-example-pages-2.4.33-lp150.2.17.1.i586", product_id: "apache2-example-pages-2.4.33-lp150.2.17.1.i586", }, }, { category: "product_version", name: "apache2-prefork-2.4.33-lp150.2.17.1.i586", product: { name: "apache2-prefork-2.4.33-lp150.2.17.1.i586", product_id: "apache2-prefork-2.4.33-lp150.2.17.1.i586", }, }, { category: "product_version", name: "apache2-utils-2.4.33-lp150.2.17.1.i586", product: { name: "apache2-utils-2.4.33-lp150.2.17.1.i586", product_id: "apache2-utils-2.4.33-lp150.2.17.1.i586", }, }, { category: "product_version", name: "apache2-worker-2.4.33-lp150.2.17.1.i586", product: { name: "apache2-worker-2.4.33-lp150.2.17.1.i586", product_id: "apache2-worker-2.4.33-lp150.2.17.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "apache2-doc-2.4.33-lp150.2.17.1.noarch", product: { name: "apache2-doc-2.4.33-lp150.2.17.1.noarch", product_id: "apache2-doc-2.4.33-lp150.2.17.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "apache2-2.4.33-lp150.2.17.1.x86_64", product: { name: "apache2-2.4.33-lp150.2.17.1.x86_64", product_id: "apache2-2.4.33-lp150.2.17.1.x86_64", }, }, { category: "product_version", name: "apache2-devel-2.4.33-lp150.2.17.1.x86_64", product: { name: "apache2-devel-2.4.33-lp150.2.17.1.x86_64", product_id: "apache2-devel-2.4.33-lp150.2.17.1.x86_64", }, }, { category: "product_version", name: "apache2-event-2.4.33-lp150.2.17.1.x86_64", product: { name: "apache2-event-2.4.33-lp150.2.17.1.x86_64", product_id: "apache2-event-2.4.33-lp150.2.17.1.x86_64", }, }, { category: "product_version", name: "apache2-example-pages-2.4.33-lp150.2.17.1.x86_64", product: { name: "apache2-example-pages-2.4.33-lp150.2.17.1.x86_64", product_id: "apache2-example-pages-2.4.33-lp150.2.17.1.x86_64", }, }, { category: "product_version", name: "apache2-prefork-2.4.33-lp150.2.17.1.x86_64", product: { name: "apache2-prefork-2.4.33-lp150.2.17.1.x86_64", product_id: "apache2-prefork-2.4.33-lp150.2.17.1.x86_64", }, }, { category: "product_version", name: "apache2-utils-2.4.33-lp150.2.17.1.x86_64", product: { name: "apache2-utils-2.4.33-lp150.2.17.1.x86_64", product_id: "apache2-utils-2.4.33-lp150.2.17.1.x86_64", }, }, { category: "product_version", name: "apache2-worker-2.4.33-lp150.2.17.1.x86_64", product: { name: "apache2-worker-2.4.33-lp150.2.17.1.x86_64", product_id: "apache2-worker-2.4.33-lp150.2.17.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Leap 15.0", product: { name: "openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.0", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "apache2-2.4.33-lp150.2.17.1.i586 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.i586", }, product_reference: "apache2-2.4.33-lp150.2.17.1.i586", relates_to_product_reference: "openSUSE Leap 15.0", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.33-lp150.2.17.1.x86_64 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.x86_64", }, product_reference: "apache2-2.4.33-lp150.2.17.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.0", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.33-lp150.2.17.1.i586 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.i586", }, product_reference: "apache2-devel-2.4.33-lp150.2.17.1.i586", relates_to_product_reference: "openSUSE Leap 15.0", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.33-lp150.2.17.1.x86_64 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.x86_64", }, product_reference: "apache2-devel-2.4.33-lp150.2.17.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.0", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.33-lp150.2.17.1.noarch as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:apache2-doc-2.4.33-lp150.2.17.1.noarch", }, product_reference: "apache2-doc-2.4.33-lp150.2.17.1.noarch", relates_to_product_reference: "openSUSE Leap 15.0", }, { category: "default_component_of", full_product_name: { name: "apache2-event-2.4.33-lp150.2.17.1.i586 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.i586", }, product_reference: "apache2-event-2.4.33-lp150.2.17.1.i586", relates_to_product_reference: "openSUSE Leap 15.0", }, { category: "default_component_of", full_product_name: { name: "apache2-event-2.4.33-lp150.2.17.1.x86_64 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.x86_64", }, product_reference: "apache2-event-2.4.33-lp150.2.17.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.0", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.33-lp150.2.17.1.i586 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.i586", }, product_reference: "apache2-example-pages-2.4.33-lp150.2.17.1.i586", relates_to_product_reference: "openSUSE Leap 15.0", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.33-lp150.2.17.1.x86_64 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.x86_64", }, product_reference: "apache2-example-pages-2.4.33-lp150.2.17.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.0", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.33-lp150.2.17.1.i586 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.i586", }, product_reference: "apache2-prefork-2.4.33-lp150.2.17.1.i586", relates_to_product_reference: "openSUSE Leap 15.0", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.33-lp150.2.17.1.x86_64 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.x86_64", }, product_reference: "apache2-prefork-2.4.33-lp150.2.17.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.0", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.33-lp150.2.17.1.i586 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.i586", }, product_reference: "apache2-utils-2.4.33-lp150.2.17.1.i586", relates_to_product_reference: "openSUSE Leap 15.0", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.33-lp150.2.17.1.x86_64 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.x86_64", }, product_reference: "apache2-utils-2.4.33-lp150.2.17.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.0", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.33-lp150.2.17.1.i586 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.i586", }, product_reference: "apache2-worker-2.4.33-lp150.2.17.1.i586", relates_to_product_reference: "openSUSE Leap 15.0", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.33-lp150.2.17.1.x86_64 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.x86_64", }, product_reference: "apache2-worker-2.4.33-lp150.2.17.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.0", }, ], }, vulnerabilities: [ { cve: "CVE-2019-0196", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-0196", }, ], notes: [ { category: "general", text: "A vulnerability was found in Apache HTTP Server 2.4.17 to 2.4.38. Using fuzzed network input, the http/2 request handling could be made to access freed memory in string comparison when determining the method of a request and thus process the request incorrectly.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-doc-2.4.33-lp150.2.17.1.noarch", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-0196", url: "https://www.suse.com/security/cve/CVE-2019-0196", }, { category: "external", summary: "SUSE Bug 1131237 for CVE-2019-0196", url: "https://bugzilla.suse.com/1131237", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-doc-2.4.33-lp150.2.17.1.noarch", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-doc-2.4.33-lp150.2.17.1.noarch", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-04-16T08:27:23Z", details: "moderate", }, ], title: "CVE-2019-0196", }, { cve: "CVE-2019-0197", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-0197", }, ], notes: [ { category: "general", text: "A vulnerability was found in Apache HTTP Server 2.4.34 to 2.4.38. When HTTP/2 was enabled for a http: host or H2Upgrade was enabled for h2 on a https: host, an Upgrade request from http/1.1 to http/2 that was not the first request on a connection could lead to a misconfiguration and crash. Server that never enabled the h2 protocol or that only enabled it for https: and did not set \"H2Upgrade on\" are unaffected by this issue.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-doc-2.4.33-lp150.2.17.1.noarch", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-0197", url: "https://www.suse.com/security/cve/CVE-2019-0197", }, { category: "external", summary: "SUSE Bug 1131245 for CVE-2019-0197", url: "https://bugzilla.suse.com/1131245", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-doc-2.4.33-lp150.2.17.1.noarch", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-doc-2.4.33-lp150.2.17.1.noarch", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-04-16T08:27:23Z", details: "moderate", }, ], title: "CVE-2019-0197", }, { cve: "CVE-2019-0211", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-0211", }, ], notes: [ { category: "general", text: "In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-doc-2.4.33-lp150.2.17.1.noarch", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-0211", url: "https://www.suse.com/security/cve/CVE-2019-0211", }, { category: "external", summary: "SUSE Bug 1131233 for CVE-2019-0211", url: "https://bugzilla.suse.com/1131233", }, { category: "external", summary: "SUSE Bug 1132978 for CVE-2019-0211", url: "https://bugzilla.suse.com/1132978", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-doc-2.4.33-lp150.2.17.1.noarch", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-doc-2.4.33-lp150.2.17.1.noarch", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-04-16T08:27:23Z", details: "important", }, ], title: "CVE-2019-0211", }, { cve: "CVE-2019-0217", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-0217", }, ], notes: [ { category: "general", text: "In Apache HTTP Server 2.4 release 2.4.38 and prior, a race condition in mod_auth_digest when running in a threaded server could allow a user with valid credentials to authenticate using another username, bypassing configured access control restrictions.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-doc-2.4.33-lp150.2.17.1.noarch", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-0217", url: "https://www.suse.com/security/cve/CVE-2019-0217", }, { category: "external", summary: "SUSE Bug 1131239 for CVE-2019-0217", url: "https://bugzilla.suse.com/1131239", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-doc-2.4.33-lp150.2.17.1.noarch", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.0", }, products: [ "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-doc-2.4.33-lp150.2.17.1.noarch", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-04-16T08:27:23Z", details: "moderate", }, ], title: "CVE-2019-0217", }, { cve: "CVE-2019-0220", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-0220", }, ], notes: [ { category: "general", text: "A vulnerability was found in Apache HTTP Server 2.4.0 to 2.4.38. When the path component of a request URL contains multiple consecutive slashes ('/'), directives such as LocationMatch and RewriteRule must account for duplicates in regular expressions while other aspects of the servers processing will implicitly collapse them.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-doc-2.4.33-lp150.2.17.1.noarch", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-0220", url: "https://www.suse.com/security/cve/CVE-2019-0220", }, { category: "external", summary: "SUSE Bug 1131241 for CVE-2019-0220", url: "https://bugzilla.suse.com/1131241", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-doc-2.4.33-lp150.2.17.1.noarch", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-doc-2.4.33-lp150.2.17.1.noarch", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-event-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp150.2.17.1.x86_64", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.i586", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp150.2.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-04-16T08:27:23Z", details: "moderate", }, ], title: "CVE-2019-0220", }, ], }
suse-su-2019:0878-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for apache2", title: "Title of the patch", }, { category: "description", text: "This update for apache2 fixes the following issues:\n\n* CVE-2019-0220: The Apache HTTP server did not use a consistent strategy for\n URL normalization throughout all of its components. In particular,\n consecutive slashes were not always collapsed. Attackers could potentially\n abuse these inconsistencies to by-pass access control mechanisms and thus\n gain unauthorized access to protected parts of the service. [bsc#1131241]\n\n* CVE-2019-0217: A race condition in Apache's 'mod_auth_digest' when running in\n a threaded server could have allowed users with valid credentials to\n authenticate using another username, bypassing configured access control\n restrictions. [bsc#1131239]\n\n* CVE-2019-0211: A flaw in the Apache HTTP Server allowed less-privileged child\n processes or threads to execute arbitrary code with the privileges of the\n parent process. Attackers with control over CGI scripts or extension modules\n run by the server could have abused this issue to potentially gain super user\n privileges. [bsc#1131233]\n\n* CVE-2019-0197: When HTTP/2 support was enabled in the Apache server for a\n 'http' host or H2Upgrade was enabled for h2 on a 'https' host, an Upgrade\n request from http/1.1 to http/2 that was not the first request on a\n connection could lead to a misconfiguration and crash. This issue could have\n been abused to mount a denial-of-service attack. Servers that never enabled\n the h2 protocol or that only enabled it for https: and did not configure the\n 'H2Upgrade on' are unaffected. [bsc#1131245]\n\n* CVE-2019-0196: Through specially crafted network input the Apache's http/2\n request handler could be lead to access previously freed memory while\n determining the method of a request. This resulted in the request being\n misclassified and thus being processed incorrectly. [bsc#1131237]\n\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2019-878,SUSE-OpenStack-Cloud-7-2019-878,SUSE-SLE-SAP-12-SP2-2019-878,SUSE-SLE-SDK-12-SP3-2019-878,SUSE-SLE-SDK-12-SP4-2019-878,SUSE-SLE-SERVER-12-SP2-2019-878,SUSE-SLE-SERVER-12-SP2-BCL-2019-878,SUSE-SLE-SERVER-12-SP3-2019-878,SUSE-SLE-SERVER-12-SP4-2019-878,SUSE-Storage-4-2019-878", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_0878-1.json", }, { category: "self", summary: "URL for SUSE-SU-2019:0878-1", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20190878-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2019:0878-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2019-April/005296.html", }, { category: "self", summary: "SUSE Bug 1131233", url: "https://bugzilla.suse.com/1131233", }, { category: "self", summary: "SUSE Bug 1131237", url: "https://bugzilla.suse.com/1131237", }, { category: "self", summary: "SUSE Bug 1131239", url: "https://bugzilla.suse.com/1131239", }, { category: "self", summary: "SUSE Bug 1131241", url: "https://bugzilla.suse.com/1131241", }, { category: "self", summary: "SUSE Bug 1131245", url: "https://bugzilla.suse.com/1131245", }, { category: "self", summary: "SUSE CVE CVE-2019-0196 page", url: "https://www.suse.com/security/cve/CVE-2019-0196/", }, { category: "self", summary: "SUSE CVE CVE-2019-0197 page", url: "https://www.suse.com/security/cve/CVE-2019-0197/", }, { category: "self", summary: "SUSE CVE CVE-2019-0211 page", url: "https://www.suse.com/security/cve/CVE-2019-0211/", }, { category: "self", summary: "SUSE CVE CVE-2019-0217 page", url: "https://www.suse.com/security/cve/CVE-2019-0217/", }, { category: "self", summary: "SUSE CVE CVE-2019-0220 page", url: "https://www.suse.com/security/cve/CVE-2019-0220/", }, ], title: "Security update for apache2", tracking: { current_release_date: "2019-04-04T14:59:53Z", generator: { date: "2019-04-04T14:59:53Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2019:0878-1", initial_release_date: "2019-04-04T14:59:53Z", revision_history: [ { date: "2019-04-04T14:59:53Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "apache2-2.4.23-29.40.1.aarch64", product: { name: "apache2-2.4.23-29.40.1.aarch64", product_id: "apache2-2.4.23-29.40.1.aarch64", }, }, { category: "product_version", name: "apache2-devel-2.4.23-29.40.1.aarch64", product: { name: "apache2-devel-2.4.23-29.40.1.aarch64", product_id: "apache2-devel-2.4.23-29.40.1.aarch64", }, }, { category: "product_version", name: "apache2-event-2.4.23-29.40.1.aarch64", product: { name: "apache2-event-2.4.23-29.40.1.aarch64", product_id: "apache2-event-2.4.23-29.40.1.aarch64", }, }, { category: "product_version", name: "apache2-example-pages-2.4.23-29.40.1.aarch64", product: { name: "apache2-example-pages-2.4.23-29.40.1.aarch64", product_id: "apache2-example-pages-2.4.23-29.40.1.aarch64", }, }, { category: "product_version", name: "apache2-prefork-2.4.23-29.40.1.aarch64", product: { name: "apache2-prefork-2.4.23-29.40.1.aarch64", product_id: "apache2-prefork-2.4.23-29.40.1.aarch64", }, }, { category: "product_version", name: "apache2-utils-2.4.23-29.40.1.aarch64", product: { name: "apache2-utils-2.4.23-29.40.1.aarch64", product_id: "apache2-utils-2.4.23-29.40.1.aarch64", }, }, { category: "product_version", name: "apache2-worker-2.4.23-29.40.1.aarch64", product: { name: "apache2-worker-2.4.23-29.40.1.aarch64", product_id: "apache2-worker-2.4.23-29.40.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "apache2-2.4.23-29.40.1.i586", product: { name: "apache2-2.4.23-29.40.1.i586", product_id: "apache2-2.4.23-29.40.1.i586", }, }, { category: "product_version", name: "apache2-devel-2.4.23-29.40.1.i586", product: { name: "apache2-devel-2.4.23-29.40.1.i586", product_id: "apache2-devel-2.4.23-29.40.1.i586", }, }, { category: "product_version", name: "apache2-event-2.4.23-29.40.1.i586", product: { name: "apache2-event-2.4.23-29.40.1.i586", product_id: "apache2-event-2.4.23-29.40.1.i586", }, }, { category: "product_version", name: "apache2-example-pages-2.4.23-29.40.1.i586", product: { name: "apache2-example-pages-2.4.23-29.40.1.i586", product_id: "apache2-example-pages-2.4.23-29.40.1.i586", }, }, { category: "product_version", name: "apache2-prefork-2.4.23-29.40.1.i586", product: { name: "apache2-prefork-2.4.23-29.40.1.i586", product_id: "apache2-prefork-2.4.23-29.40.1.i586", }, }, { category: "product_version", name: "apache2-utils-2.4.23-29.40.1.i586", product: { name: "apache2-utils-2.4.23-29.40.1.i586", product_id: "apache2-utils-2.4.23-29.40.1.i586", }, }, { category: "product_version", name: "apache2-worker-2.4.23-29.40.1.i586", product: { name: "apache2-worker-2.4.23-29.40.1.i586", product_id: "apache2-worker-2.4.23-29.40.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "apache2-doc-2.4.23-29.40.1.noarch", product: { name: "apache2-doc-2.4.23-29.40.1.noarch", product_id: "apache2-doc-2.4.23-29.40.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "apache2-2.4.23-29.40.1.ppc64le", product: { name: "apache2-2.4.23-29.40.1.ppc64le", product_id: "apache2-2.4.23-29.40.1.ppc64le", }, }, { category: "product_version", name: "apache2-devel-2.4.23-29.40.1.ppc64le", product: { name: "apache2-devel-2.4.23-29.40.1.ppc64le", product_id: "apache2-devel-2.4.23-29.40.1.ppc64le", }, }, { category: "product_version", name: "apache2-event-2.4.23-29.40.1.ppc64le", product: { name: "apache2-event-2.4.23-29.40.1.ppc64le", product_id: "apache2-event-2.4.23-29.40.1.ppc64le", }, }, { category: "product_version", name: "apache2-example-pages-2.4.23-29.40.1.ppc64le", product: { name: "apache2-example-pages-2.4.23-29.40.1.ppc64le", product_id: "apache2-example-pages-2.4.23-29.40.1.ppc64le", }, }, { category: "product_version", name: "apache2-prefork-2.4.23-29.40.1.ppc64le", product: { name: "apache2-prefork-2.4.23-29.40.1.ppc64le", product_id: "apache2-prefork-2.4.23-29.40.1.ppc64le", }, }, { category: "product_version", name: "apache2-utils-2.4.23-29.40.1.ppc64le", product: { name: "apache2-utils-2.4.23-29.40.1.ppc64le", product_id: "apache2-utils-2.4.23-29.40.1.ppc64le", }, }, { category: "product_version", name: "apache2-worker-2.4.23-29.40.1.ppc64le", product: { name: "apache2-worker-2.4.23-29.40.1.ppc64le", product_id: "apache2-worker-2.4.23-29.40.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "apache2-2.4.23-29.40.1.s390", product: { name: "apache2-2.4.23-29.40.1.s390", product_id: "apache2-2.4.23-29.40.1.s390", }, }, { category: "product_version", name: "apache2-devel-2.4.23-29.40.1.s390", product: { name: "apache2-devel-2.4.23-29.40.1.s390", product_id: "apache2-devel-2.4.23-29.40.1.s390", }, }, { category: "product_version", name: "apache2-event-2.4.23-29.40.1.s390", product: { name: "apache2-event-2.4.23-29.40.1.s390", product_id: "apache2-event-2.4.23-29.40.1.s390", }, }, { category: "product_version", name: "apache2-example-pages-2.4.23-29.40.1.s390", product: { name: "apache2-example-pages-2.4.23-29.40.1.s390", product_id: "apache2-example-pages-2.4.23-29.40.1.s390", }, }, { category: "product_version", name: "apache2-prefork-2.4.23-29.40.1.s390", product: { name: "apache2-prefork-2.4.23-29.40.1.s390", product_id: "apache2-prefork-2.4.23-29.40.1.s390", }, }, { category: "product_version", name: "apache2-utils-2.4.23-29.40.1.s390", product: { name: "apache2-utils-2.4.23-29.40.1.s390", product_id: "apache2-utils-2.4.23-29.40.1.s390", }, }, { category: "product_version", name: "apache2-worker-2.4.23-29.40.1.s390", product: { name: "apache2-worker-2.4.23-29.40.1.s390", product_id: "apache2-worker-2.4.23-29.40.1.s390", }, }, ], category: "architecture", name: "s390", }, { branches: [ { category: "product_version", name: "apache2-2.4.23-29.40.1.s390x", product: { name: "apache2-2.4.23-29.40.1.s390x", product_id: "apache2-2.4.23-29.40.1.s390x", }, }, { category: "product_version", name: "apache2-devel-2.4.23-29.40.1.s390x", product: { name: "apache2-devel-2.4.23-29.40.1.s390x", product_id: "apache2-devel-2.4.23-29.40.1.s390x", }, }, { category: "product_version", name: "apache2-event-2.4.23-29.40.1.s390x", product: { name: "apache2-event-2.4.23-29.40.1.s390x", product_id: "apache2-event-2.4.23-29.40.1.s390x", }, }, { category: "product_version", name: "apache2-example-pages-2.4.23-29.40.1.s390x", product: { name: "apache2-example-pages-2.4.23-29.40.1.s390x", product_id: "apache2-example-pages-2.4.23-29.40.1.s390x", }, }, { category: "product_version", name: "apache2-prefork-2.4.23-29.40.1.s390x", product: { name: "apache2-prefork-2.4.23-29.40.1.s390x", product_id: "apache2-prefork-2.4.23-29.40.1.s390x", }, }, { category: "product_version", name: "apache2-utils-2.4.23-29.40.1.s390x", product: { name: "apache2-utils-2.4.23-29.40.1.s390x", product_id: "apache2-utils-2.4.23-29.40.1.s390x", }, }, { category: "product_version", name: "apache2-worker-2.4.23-29.40.1.s390x", product: { name: "apache2-worker-2.4.23-29.40.1.s390x", product_id: "apache2-worker-2.4.23-29.40.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "apache2-2.4.23-29.40.1.x86_64", product: { name: "apache2-2.4.23-29.40.1.x86_64", product_id: "apache2-2.4.23-29.40.1.x86_64", }, }, { category: "product_version", name: "apache2-devel-2.4.23-29.40.1.x86_64", product: { name: "apache2-devel-2.4.23-29.40.1.x86_64", product_id: "apache2-devel-2.4.23-29.40.1.x86_64", }, }, { category: "product_version", name: "apache2-event-2.4.23-29.40.1.x86_64", product: { name: "apache2-event-2.4.23-29.40.1.x86_64", product_id: "apache2-event-2.4.23-29.40.1.x86_64", }, }, { category: "product_version", name: "apache2-example-pages-2.4.23-29.40.1.x86_64", product: { name: "apache2-example-pages-2.4.23-29.40.1.x86_64", product_id: "apache2-example-pages-2.4.23-29.40.1.x86_64", }, }, { category: "product_version", name: "apache2-prefork-2.4.23-29.40.1.x86_64", product: { name: "apache2-prefork-2.4.23-29.40.1.x86_64", product_id: "apache2-prefork-2.4.23-29.40.1.x86_64", }, }, { category: "product_version", name: "apache2-utils-2.4.23-29.40.1.x86_64", product: { name: "apache2-utils-2.4.23-29.40.1.x86_64", product_id: "apache2-utils-2.4.23-29.40.1.x86_64", }, }, { category: "product_version", name: "apache2-worker-2.4.23-29.40.1.x86_64", product: { name: "apache2-worker-2.4.23-29.40.1.x86_64", product_id: "apache2-worker-2.4.23-29.40.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE OpenStack Cloud 7", product: { name: "SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud:7", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Software Development Kit 12 SP3", product: { name: "SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-sdk:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Software Development Kit 12 SP4", product: { name: "SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-sdk:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP2-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP2-BCL", product: { name: "SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles-bcl:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP3", product: { name: "SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP4", product: { name: "SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp4", }, }, }, { category: "product_name", name: "SUSE Enterprise Storage 4", product: { name: "SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4", product_identification_helper: { cpe: "cpe:/o:suse:ses:4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "apache2-2.4.23-29.40.1.s390x as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:apache2-2.4.23-29.40.1.s390x", }, product_reference: "apache2-2.4.23-29.40.1.s390x", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.23-29.40.1.x86_64 as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:apache2-2.4.23-29.40.1.x86_64", }, product_reference: "apache2-2.4.23-29.40.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.23-29.40.1.noarch as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:apache2-doc-2.4.23-29.40.1.noarch", }, product_reference: "apache2-doc-2.4.23-29.40.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.23-29.40.1.s390x as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:apache2-example-pages-2.4.23-29.40.1.s390x", }, product_reference: "apache2-example-pages-2.4.23-29.40.1.s390x", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.23-29.40.1.x86_64 as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:apache2-example-pages-2.4.23-29.40.1.x86_64", }, product_reference: "apache2-example-pages-2.4.23-29.40.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.23-29.40.1.s390x as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:apache2-prefork-2.4.23-29.40.1.s390x", }, product_reference: "apache2-prefork-2.4.23-29.40.1.s390x", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.23-29.40.1.x86_64 as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:apache2-prefork-2.4.23-29.40.1.x86_64", }, product_reference: "apache2-prefork-2.4.23-29.40.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.23-29.40.1.s390x as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:apache2-utils-2.4.23-29.40.1.s390x", }, product_reference: "apache2-utils-2.4.23-29.40.1.s390x", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.23-29.40.1.x86_64 as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:apache2-utils-2.4.23-29.40.1.x86_64", }, product_reference: "apache2-utils-2.4.23-29.40.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.23-29.40.1.s390x as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:apache2-worker-2.4.23-29.40.1.s390x", }, product_reference: "apache2-worker-2.4.23-29.40.1.s390x", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.23-29.40.1.x86_64 as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:apache2-worker-2.4.23-29.40.1.x86_64", }, product_reference: "apache2-worker-2.4.23-29.40.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.23-29.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.40.1.ppc64le", }, product_reference: "apache2-2.4.23-29.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.23-29.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.40.1.x86_64", }, product_reference: "apache2-2.4.23-29.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.23-29.40.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-doc-2.4.23-29.40.1.noarch", }, product_reference: "apache2-doc-2.4.23-29.40.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.23-29.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.40.1.ppc64le", }, product_reference: "apache2-example-pages-2.4.23-29.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.23-29.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.40.1.x86_64", }, product_reference: "apache2-example-pages-2.4.23-29.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.23-29.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.40.1.ppc64le", }, product_reference: "apache2-prefork-2.4.23-29.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.23-29.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.40.1.x86_64", }, product_reference: "apache2-prefork-2.4.23-29.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.23-29.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.40.1.ppc64le", }, product_reference: "apache2-utils-2.4.23-29.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.23-29.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.40.1.x86_64", }, product_reference: "apache2-utils-2.4.23-29.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.23-29.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.40.1.ppc64le", }, product_reference: "apache2-worker-2.4.23-29.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.23-29.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.40.1.x86_64", }, product_reference: "apache2-worker-2.4.23-29.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.23-29.40.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.aarch64", }, product_reference: "apache2-devel-2.4.23-29.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.23-29.40.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.ppc64le", }, product_reference: "apache2-devel-2.4.23-29.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.23-29.40.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.s390x", }, product_reference: "apache2-devel-2.4.23-29.40.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.23-29.40.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.x86_64", }, product_reference: "apache2-devel-2.4.23-29.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.23-29.40.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.aarch64", }, product_reference: "apache2-devel-2.4.23-29.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.23-29.40.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.ppc64le", }, product_reference: "apache2-devel-2.4.23-29.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.23-29.40.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.s390x", }, product_reference: "apache2-devel-2.4.23-29.40.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.23-29.40.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.x86_64", }, product_reference: "apache2-devel-2.4.23-29.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.23-29.40.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.40.1.ppc64le", }, product_reference: "apache2-2.4.23-29.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.23-29.40.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.40.1.s390x", }, product_reference: "apache2-2.4.23-29.40.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.23-29.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.40.1.x86_64", }, product_reference: "apache2-2.4.23-29.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.23-29.40.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-doc-2.4.23-29.40.1.noarch", }, product_reference: "apache2-doc-2.4.23-29.40.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.23-29.40.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.40.1.ppc64le", }, product_reference: "apache2-example-pages-2.4.23-29.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.23-29.40.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.40.1.s390x", }, product_reference: "apache2-example-pages-2.4.23-29.40.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.23-29.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.40.1.x86_64", }, product_reference: "apache2-example-pages-2.4.23-29.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.23-29.40.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.40.1.ppc64le", }, product_reference: "apache2-prefork-2.4.23-29.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.23-29.40.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.40.1.s390x", }, product_reference: "apache2-prefork-2.4.23-29.40.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.23-29.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.40.1.x86_64", }, product_reference: "apache2-prefork-2.4.23-29.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.23-29.40.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.40.1.ppc64le", }, product_reference: "apache2-utils-2.4.23-29.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.23-29.40.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.40.1.s390x", }, product_reference: "apache2-utils-2.4.23-29.40.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.23-29.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.40.1.x86_64", }, product_reference: "apache2-utils-2.4.23-29.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.23-29.40.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.40.1.ppc64le", }, product_reference: "apache2-worker-2.4.23-29.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.23-29.40.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.40.1.s390x", }, product_reference: "apache2-worker-2.4.23-29.40.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.23-29.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.40.1.x86_64", }, product_reference: "apache2-worker-2.4.23-29.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.23-29.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.40.1.x86_64", }, product_reference: "apache2-2.4.23-29.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.23-29.40.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.40.1.noarch", }, product_reference: "apache2-doc-2.4.23-29.40.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.23-29.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.40.1.x86_64", }, product_reference: "apache2-example-pages-2.4.23-29.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.23-29.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.40.1.x86_64", }, product_reference: "apache2-prefork-2.4.23-29.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.23-29.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.40.1.x86_64", }, product_reference: "apache2-utils-2.4.23-29.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.23-29.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.40.1.x86_64", }, product_reference: "apache2-worker-2.4.23-29.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.23-29.40.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.aarch64", }, product_reference: "apache2-2.4.23-29.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.23-29.40.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.ppc64le", }, product_reference: "apache2-2.4.23-29.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.23-29.40.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.s390x", }, product_reference: "apache2-2.4.23-29.40.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.23-29.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.x86_64", }, product_reference: "apache2-2.4.23-29.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.23-29.40.1.noarch as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:apache2-doc-2.4.23-29.40.1.noarch", }, product_reference: "apache2-doc-2.4.23-29.40.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.23-29.40.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.aarch64", }, product_reference: "apache2-example-pages-2.4.23-29.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.23-29.40.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.ppc64le", }, product_reference: "apache2-example-pages-2.4.23-29.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.23-29.40.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.s390x", }, product_reference: "apache2-example-pages-2.4.23-29.40.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.23-29.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.x86_64", }, product_reference: "apache2-example-pages-2.4.23-29.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.23-29.40.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.aarch64", }, product_reference: "apache2-prefork-2.4.23-29.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.23-29.40.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.ppc64le", }, product_reference: "apache2-prefork-2.4.23-29.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.23-29.40.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.s390x", }, product_reference: "apache2-prefork-2.4.23-29.40.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.23-29.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.x86_64", }, product_reference: "apache2-prefork-2.4.23-29.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.23-29.40.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.aarch64", }, product_reference: "apache2-utils-2.4.23-29.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.23-29.40.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.ppc64le", }, product_reference: "apache2-utils-2.4.23-29.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.23-29.40.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.s390x", }, product_reference: "apache2-utils-2.4.23-29.40.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.23-29.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.x86_64", }, product_reference: "apache2-utils-2.4.23-29.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.23-29.40.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.aarch64", }, product_reference: "apache2-worker-2.4.23-29.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.23-29.40.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.ppc64le", }, product_reference: "apache2-worker-2.4.23-29.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.23-29.40.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.s390x", }, product_reference: "apache2-worker-2.4.23-29.40.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.23-29.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.x86_64", }, product_reference: "apache2-worker-2.4.23-29.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.23-29.40.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.aarch64", }, product_reference: "apache2-2.4.23-29.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.23-29.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.ppc64le", }, product_reference: "apache2-2.4.23-29.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.23-29.40.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.s390x", }, product_reference: "apache2-2.4.23-29.40.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.23-29.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.x86_64", }, product_reference: "apache2-2.4.23-29.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.23-29.40.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.40.1.noarch", }, product_reference: "apache2-doc-2.4.23-29.40.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.23-29.40.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.aarch64", }, product_reference: "apache2-example-pages-2.4.23-29.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.23-29.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.ppc64le", }, product_reference: "apache2-example-pages-2.4.23-29.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.23-29.40.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.s390x", }, product_reference: "apache2-example-pages-2.4.23-29.40.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.23-29.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.x86_64", }, product_reference: "apache2-example-pages-2.4.23-29.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.23-29.40.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.aarch64", }, product_reference: "apache2-prefork-2.4.23-29.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.23-29.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.ppc64le", }, product_reference: "apache2-prefork-2.4.23-29.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.23-29.40.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.s390x", }, product_reference: "apache2-prefork-2.4.23-29.40.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.23-29.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.x86_64", }, product_reference: "apache2-prefork-2.4.23-29.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.23-29.40.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.aarch64", }, product_reference: "apache2-utils-2.4.23-29.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.23-29.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.ppc64le", }, product_reference: "apache2-utils-2.4.23-29.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.23-29.40.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.s390x", }, product_reference: "apache2-utils-2.4.23-29.40.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.23-29.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.x86_64", }, product_reference: "apache2-utils-2.4.23-29.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.23-29.40.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.aarch64", }, product_reference: "apache2-worker-2.4.23-29.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.23-29.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.ppc64le", }, product_reference: "apache2-worker-2.4.23-29.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.23-29.40.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.s390x", }, product_reference: "apache2-worker-2.4.23-29.40.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.23-29.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.x86_64", }, product_reference: "apache2-worker-2.4.23-29.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.23-29.40.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.aarch64", }, product_reference: "apache2-2.4.23-29.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.23-29.40.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.ppc64le", }, product_reference: "apache2-2.4.23-29.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.23-29.40.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.s390x", }, product_reference: "apache2-2.4.23-29.40.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.23-29.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.x86_64", }, product_reference: "apache2-2.4.23-29.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.23-29.40.1.noarch as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:apache2-doc-2.4.23-29.40.1.noarch", }, product_reference: "apache2-doc-2.4.23-29.40.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.23-29.40.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.aarch64", }, product_reference: "apache2-example-pages-2.4.23-29.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.23-29.40.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.ppc64le", }, product_reference: "apache2-example-pages-2.4.23-29.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.23-29.40.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.s390x", }, product_reference: "apache2-example-pages-2.4.23-29.40.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.23-29.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.x86_64", }, product_reference: "apache2-example-pages-2.4.23-29.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.23-29.40.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.aarch64", }, product_reference: "apache2-prefork-2.4.23-29.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.23-29.40.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.ppc64le", }, product_reference: "apache2-prefork-2.4.23-29.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.23-29.40.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.s390x", }, product_reference: "apache2-prefork-2.4.23-29.40.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.23-29.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.x86_64", }, product_reference: "apache2-prefork-2.4.23-29.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.23-29.40.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.aarch64", }, product_reference: "apache2-utils-2.4.23-29.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.23-29.40.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.ppc64le", }, product_reference: "apache2-utils-2.4.23-29.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.23-29.40.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.s390x", }, product_reference: "apache2-utils-2.4.23-29.40.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.23-29.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.x86_64", }, product_reference: "apache2-utils-2.4.23-29.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.23-29.40.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.aarch64", }, product_reference: "apache2-worker-2.4.23-29.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.23-29.40.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.ppc64le", }, product_reference: "apache2-worker-2.4.23-29.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.23-29.40.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.s390x", }, product_reference: "apache2-worker-2.4.23-29.40.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.23-29.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.x86_64", }, product_reference: "apache2-worker-2.4.23-29.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.23-29.40.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.aarch64", }, product_reference: "apache2-2.4.23-29.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.23-29.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.ppc64le", }, product_reference: "apache2-2.4.23-29.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.23-29.40.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.s390x", }, product_reference: "apache2-2.4.23-29.40.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.23-29.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.x86_64", }, product_reference: "apache2-2.4.23-29.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.23-29.40.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.40.1.noarch", }, product_reference: "apache2-doc-2.4.23-29.40.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.23-29.40.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.aarch64", }, product_reference: "apache2-example-pages-2.4.23-29.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.23-29.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.ppc64le", }, product_reference: "apache2-example-pages-2.4.23-29.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.23-29.40.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.s390x", }, product_reference: "apache2-example-pages-2.4.23-29.40.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.23-29.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.x86_64", }, product_reference: "apache2-example-pages-2.4.23-29.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.23-29.40.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.aarch64", }, product_reference: "apache2-prefork-2.4.23-29.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.23-29.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.ppc64le", }, product_reference: "apache2-prefork-2.4.23-29.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.23-29.40.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.s390x", }, product_reference: "apache2-prefork-2.4.23-29.40.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.23-29.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.x86_64", }, product_reference: "apache2-prefork-2.4.23-29.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.23-29.40.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.aarch64", }, product_reference: "apache2-utils-2.4.23-29.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.23-29.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.ppc64le", }, product_reference: "apache2-utils-2.4.23-29.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.23-29.40.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.s390x", }, product_reference: "apache2-utils-2.4.23-29.40.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.23-29.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.x86_64", }, product_reference: "apache2-utils-2.4.23-29.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.23-29.40.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.aarch64", }, product_reference: "apache2-worker-2.4.23-29.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.23-29.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.ppc64le", }, product_reference: "apache2-worker-2.4.23-29.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.23-29.40.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.s390x", }, product_reference: "apache2-worker-2.4.23-29.40.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.23-29.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.x86_64", }, product_reference: "apache2-worker-2.4.23-29.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.23-29.40.1.x86_64 as component of SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4:apache2-2.4.23-29.40.1.x86_64", }, product_reference: "apache2-2.4.23-29.40.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 4", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.23-29.40.1.noarch as component of SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4:apache2-doc-2.4.23-29.40.1.noarch", }, product_reference: "apache2-doc-2.4.23-29.40.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 4", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.23-29.40.1.x86_64 as component of SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4:apache2-example-pages-2.4.23-29.40.1.x86_64", }, product_reference: "apache2-example-pages-2.4.23-29.40.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 4", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.23-29.40.1.x86_64 as component of SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4:apache2-prefork-2.4.23-29.40.1.x86_64", }, product_reference: "apache2-prefork-2.4.23-29.40.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 4", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.23-29.40.1.x86_64 as component of SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4:apache2-utils-2.4.23-29.40.1.x86_64", }, product_reference: "apache2-utils-2.4.23-29.40.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 4", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.23-29.40.1.x86_64 as component of SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4:apache2-worker-2.4.23-29.40.1.x86_64", }, product_reference: "apache2-worker-2.4.23-29.40.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 4", }, ], }, vulnerabilities: [ { cve: "CVE-2019-0196", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-0196", }, ], notes: [ { category: "general", text: "A vulnerability was found in Apache HTTP Server 2.4.17 to 2.4.38. Using fuzzed network input, the http/2 request handling could be made to access freed memory in string comparison when determining the method of a request and thus process the request incorrectly.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:apache2-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Enterprise Storage 4:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-doc-2.4.23-29.40.1.noarch", "SUSE OpenStack Cloud 7:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-utils-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-worker-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-worker-2.4.23-29.40.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-0196", url: "https://www.suse.com/security/cve/CVE-2019-0196", }, { category: "external", summary: "SUSE Bug 1131237 for CVE-2019-0196", url: "https://bugzilla.suse.com/1131237", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:apache2-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Enterprise Storage 4:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-doc-2.4.23-29.40.1.noarch", "SUSE OpenStack Cloud 7:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-utils-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-worker-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-worker-2.4.23-29.40.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:apache2-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Enterprise Storage 4:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-doc-2.4.23-29.40.1.noarch", "SUSE OpenStack Cloud 7:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-utils-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-worker-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-worker-2.4.23-29.40.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-04-04T14:59:53Z", details: "moderate", }, ], title: "CVE-2019-0196", }, { cve: "CVE-2019-0197", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-0197", }, ], notes: [ { category: "general", text: "A vulnerability was found in Apache HTTP Server 2.4.34 to 2.4.38. When HTTP/2 was enabled for a http: host or H2Upgrade was enabled for h2 on a https: host, an Upgrade request from http/1.1 to http/2 that was not the first request on a connection could lead to a misconfiguration and crash. Server that never enabled the h2 protocol or that only enabled it for https: and did not set \"H2Upgrade on\" are unaffected by this issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:apache2-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Enterprise Storage 4:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-doc-2.4.23-29.40.1.noarch", "SUSE OpenStack Cloud 7:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-utils-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-worker-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-worker-2.4.23-29.40.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-0197", url: "https://www.suse.com/security/cve/CVE-2019-0197", }, { category: "external", summary: "SUSE Bug 1131245 for CVE-2019-0197", url: "https://bugzilla.suse.com/1131245", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:apache2-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Enterprise Storage 4:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-doc-2.4.23-29.40.1.noarch", "SUSE OpenStack Cloud 7:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-utils-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-worker-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-worker-2.4.23-29.40.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 4:apache2-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Enterprise Storage 4:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-doc-2.4.23-29.40.1.noarch", "SUSE OpenStack Cloud 7:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-utils-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-worker-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-worker-2.4.23-29.40.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-04-04T14:59:53Z", details: "moderate", }, ], title: "CVE-2019-0197", }, { cve: "CVE-2019-0211", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-0211", }, ], notes: [ { category: "general", text: "In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:apache2-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Enterprise Storage 4:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-doc-2.4.23-29.40.1.noarch", "SUSE OpenStack Cloud 7:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-utils-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-worker-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-worker-2.4.23-29.40.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-0211", url: "https://www.suse.com/security/cve/CVE-2019-0211", }, { category: "external", summary: "SUSE Bug 1131233 for CVE-2019-0211", url: "https://bugzilla.suse.com/1131233", }, { category: "external", summary: "SUSE Bug 1132978 for CVE-2019-0211", url: "https://bugzilla.suse.com/1132978", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:apache2-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Enterprise Storage 4:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-doc-2.4.23-29.40.1.noarch", "SUSE OpenStack Cloud 7:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-utils-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-worker-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-worker-2.4.23-29.40.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:apache2-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Enterprise Storage 4:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-doc-2.4.23-29.40.1.noarch", "SUSE OpenStack Cloud 7:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-utils-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-worker-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-worker-2.4.23-29.40.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-04-04T14:59:53Z", details: "important", }, ], title: "CVE-2019-0211", }, { cve: "CVE-2019-0217", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-0217", }, ], notes: [ { category: "general", text: "In Apache HTTP Server 2.4 release 2.4.38 and prior, a race condition in mod_auth_digest when running in a threaded server could allow a user with valid credentials to authenticate using another username, bypassing configured access control restrictions.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:apache2-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Enterprise Storage 4:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-doc-2.4.23-29.40.1.noarch", "SUSE OpenStack Cloud 7:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-utils-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-worker-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-worker-2.4.23-29.40.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-0217", url: "https://www.suse.com/security/cve/CVE-2019-0217", }, { category: "external", summary: "SUSE Bug 1131239 for CVE-2019-0217", url: "https://bugzilla.suse.com/1131239", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:apache2-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Enterprise Storage 4:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-doc-2.4.23-29.40.1.noarch", "SUSE OpenStack Cloud 7:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-utils-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-worker-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-worker-2.4.23-29.40.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:apache2-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Enterprise Storage 4:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-doc-2.4.23-29.40.1.noarch", "SUSE OpenStack Cloud 7:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-utils-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-worker-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-worker-2.4.23-29.40.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-04-04T14:59:53Z", details: "moderate", }, ], title: "CVE-2019-0217", }, { cve: "CVE-2019-0220", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-0220", }, ], notes: [ { category: "general", text: "A vulnerability was found in Apache HTTP Server 2.4.0 to 2.4.38. When the path component of a request URL contains multiple consecutive slashes ('/'), directives such as LocationMatch and RewriteRule must account for duplicates in regular expressions while other aspects of the servers processing will implicitly collapse them.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:apache2-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Enterprise Storage 4:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-doc-2.4.23-29.40.1.noarch", "SUSE OpenStack Cloud 7:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-utils-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-worker-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-worker-2.4.23-29.40.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-0220", url: "https://www.suse.com/security/cve/CVE-2019-0220", }, { category: "external", summary: "SUSE Bug 1131241 for CVE-2019-0220", url: "https://bugzilla.suse.com/1131241", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:apache2-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Enterprise Storage 4:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-doc-2.4.23-29.40.1.noarch", "SUSE OpenStack Cloud 7:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-utils-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-worker-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-worker-2.4.23-29.40.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:apache2-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Enterprise Storage 4:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Enterprise Storage 4:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-doc-2.4.23-29.40.1.noarch", "SUSE OpenStack Cloud 7:apache2-example-pages-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-example-pages-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-prefork-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-prefork-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-utils-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-utils-2.4.23-29.40.1.x86_64", "SUSE OpenStack Cloud 7:apache2-worker-2.4.23-29.40.1.s390x", "SUSE OpenStack Cloud 7:apache2-worker-2.4.23-29.40.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-04-04T14:59:53Z", details: "moderate", }, ], title: "CVE-2019-0220", }, ], }
suse-su-2019:0873-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for apache2", title: "Title of the patch", }, { category: "description", text: "This update for apache2 fixes the following issues:\n\n* CVE-2019-0211: A flaw in the Apache HTTP Server allowed less-privileged child\n processes or threads to execute arbitrary code with the privileges of the\n parent process. Attackers with control over CGI scripts or extension modules\n run by the server could have abused this issue to potentially gain super user\n privileges. [bsc#1131233]\n\n* CVE-2019-0220: The Apache HTTP server did not use a consistent strategy for\n URL normalization throughout all of its components. In particular,\n consecutive slashes were not always collapsed. Attackers could potentially\n abuse these inconsistencies to by-pass access control mechanisms and thus\n gain unauthorized access to protected parts of the service. [bsc#1131241]\n\n* CVE-2019-0217: A race condition in Apache's 'mod_auth_digest' when running in\n a threaded server could have allowed users with valid credentials to\n authenticate using another username, bypassing configured access control\n restrictions. [bsc#1131239]\n\n* CVE-2019-0197: When HTTP/2 support was enabled in the Apache server for a\n 'http' host or H2Upgrade was enabled for h2 on a 'https' host, an Upgrade\n request from http/1.1 to http/2 that was not the first request on a\n connection could lead to a misconfiguration and crash. This issue could have\n been abused to mount a denial-of-service attack. Servers that never enabled\n the h2 protocol or that only enabled it for https: and did not configure the\n 'H2Upgrade on' are unaffected. [bsc#1131245]\n\n* CVE-2019-0196: Through specially crafted network input the Apache's http/2\n request handler could be lead to access previously freed memory while\n determining the method of a request. This resulted in the request being\n misclassified and thus being processed incorrectly. [bsc#1131237]\n\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2019-873,SUSE-SLE-Module-Development-Tools-OBS-15-2019-873,SUSE-SLE-Module-Server-Applications-15-2019-873", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_0873-1.json", }, { category: "self", summary: "URL for SUSE-SU-2019:0873-1", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20190873-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2019:0873-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2019-April/005295.html", }, { category: "self", summary: "SUSE Bug 1131233", url: "https://bugzilla.suse.com/1131233", }, { category: "self", summary: "SUSE Bug 1131237", url: "https://bugzilla.suse.com/1131237", }, { category: "self", summary: "SUSE Bug 1131239", url: "https://bugzilla.suse.com/1131239", }, { category: "self", summary: "SUSE Bug 1131241", url: "https://bugzilla.suse.com/1131241", }, { category: "self", summary: "SUSE Bug 1131245", url: "https://bugzilla.suse.com/1131245", }, { category: "self", summary: "SUSE CVE CVE-2019-0196 page", url: "https://www.suse.com/security/cve/CVE-2019-0196/", }, { category: "self", summary: "SUSE CVE CVE-2019-0197 page", url: "https://www.suse.com/security/cve/CVE-2019-0197/", }, { category: "self", summary: "SUSE CVE CVE-2019-0211 page", url: "https://www.suse.com/security/cve/CVE-2019-0211/", }, { category: "self", summary: "SUSE CVE CVE-2019-0217 page", url: "https://www.suse.com/security/cve/CVE-2019-0217/", }, { category: "self", summary: "SUSE CVE CVE-2019-0220 page", url: "https://www.suse.com/security/cve/CVE-2019-0220/", }, ], title: "Security update for apache2", tracking: { current_release_date: "2019-04-04T12:22:41Z", generator: { date: "2019-04-04T12:22:41Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2019:0873-1", initial_release_date: "2019-04-04T12:22:41Z", revision_history: [ { date: "2019-04-04T12:22:41Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "apache2-2.4.33-3.15.1.aarch64", product: { name: "apache2-2.4.33-3.15.1.aarch64", product_id: "apache2-2.4.33-3.15.1.aarch64", }, }, { category: "product_version", name: "apache2-devel-2.4.33-3.15.1.aarch64", product: { name: "apache2-devel-2.4.33-3.15.1.aarch64", product_id: "apache2-devel-2.4.33-3.15.1.aarch64", }, }, { category: "product_version", name: "apache2-event-2.4.33-3.15.1.aarch64", product: { name: "apache2-event-2.4.33-3.15.1.aarch64", product_id: "apache2-event-2.4.33-3.15.1.aarch64", }, }, { category: "product_version", name: "apache2-example-pages-2.4.33-3.15.1.aarch64", product: { name: "apache2-example-pages-2.4.33-3.15.1.aarch64", product_id: "apache2-example-pages-2.4.33-3.15.1.aarch64", }, }, { category: "product_version", name: "apache2-prefork-2.4.33-3.15.1.aarch64", product: { name: "apache2-prefork-2.4.33-3.15.1.aarch64", product_id: "apache2-prefork-2.4.33-3.15.1.aarch64", }, }, { category: "product_version", name: "apache2-utils-2.4.33-3.15.1.aarch64", product: { name: "apache2-utils-2.4.33-3.15.1.aarch64", product_id: "apache2-utils-2.4.33-3.15.1.aarch64", }, }, { category: "product_version", name: "apache2-worker-2.4.33-3.15.1.aarch64", product: { name: "apache2-worker-2.4.33-3.15.1.aarch64", product_id: "apache2-worker-2.4.33-3.15.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "apache2-2.4.33-3.15.1.i586", product: { name: "apache2-2.4.33-3.15.1.i586", product_id: "apache2-2.4.33-3.15.1.i586", }, }, { category: "product_version", name: "apache2-devel-2.4.33-3.15.1.i586", product: { name: "apache2-devel-2.4.33-3.15.1.i586", product_id: "apache2-devel-2.4.33-3.15.1.i586", }, }, { category: "product_version", name: "apache2-event-2.4.33-3.15.1.i586", product: { name: "apache2-event-2.4.33-3.15.1.i586", product_id: "apache2-event-2.4.33-3.15.1.i586", }, }, { category: "product_version", name: "apache2-example-pages-2.4.33-3.15.1.i586", product: { name: "apache2-example-pages-2.4.33-3.15.1.i586", product_id: "apache2-example-pages-2.4.33-3.15.1.i586", }, }, { category: "product_version", name: "apache2-prefork-2.4.33-3.15.1.i586", product: { name: "apache2-prefork-2.4.33-3.15.1.i586", product_id: "apache2-prefork-2.4.33-3.15.1.i586", }, }, { category: "product_version", name: "apache2-utils-2.4.33-3.15.1.i586", product: { name: "apache2-utils-2.4.33-3.15.1.i586", product_id: "apache2-utils-2.4.33-3.15.1.i586", }, }, { category: "product_version", name: "apache2-worker-2.4.33-3.15.1.i586", product: { name: "apache2-worker-2.4.33-3.15.1.i586", product_id: "apache2-worker-2.4.33-3.15.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "apache2-doc-2.4.33-3.15.1.noarch", product: { name: "apache2-doc-2.4.33-3.15.1.noarch", product_id: "apache2-doc-2.4.33-3.15.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "apache2-2.4.33-3.15.1.ppc64le", product: { name: "apache2-2.4.33-3.15.1.ppc64le", product_id: "apache2-2.4.33-3.15.1.ppc64le", }, }, { category: "product_version", name: "apache2-devel-2.4.33-3.15.1.ppc64le", product: { name: "apache2-devel-2.4.33-3.15.1.ppc64le", product_id: "apache2-devel-2.4.33-3.15.1.ppc64le", }, }, { category: "product_version", name: "apache2-event-2.4.33-3.15.1.ppc64le", product: { name: "apache2-event-2.4.33-3.15.1.ppc64le", product_id: "apache2-event-2.4.33-3.15.1.ppc64le", }, }, { category: "product_version", name: "apache2-example-pages-2.4.33-3.15.1.ppc64le", product: { name: "apache2-example-pages-2.4.33-3.15.1.ppc64le", product_id: "apache2-example-pages-2.4.33-3.15.1.ppc64le", }, }, { category: "product_version", name: "apache2-prefork-2.4.33-3.15.1.ppc64le", product: { name: "apache2-prefork-2.4.33-3.15.1.ppc64le", product_id: "apache2-prefork-2.4.33-3.15.1.ppc64le", }, }, { category: "product_version", name: "apache2-utils-2.4.33-3.15.1.ppc64le", product: { name: "apache2-utils-2.4.33-3.15.1.ppc64le", product_id: "apache2-utils-2.4.33-3.15.1.ppc64le", }, }, { category: "product_version", name: "apache2-worker-2.4.33-3.15.1.ppc64le", product: { name: "apache2-worker-2.4.33-3.15.1.ppc64le", product_id: "apache2-worker-2.4.33-3.15.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "apache2-2.4.33-3.15.1.s390x", product: { name: "apache2-2.4.33-3.15.1.s390x", product_id: "apache2-2.4.33-3.15.1.s390x", }, }, { category: "product_version", name: "apache2-devel-2.4.33-3.15.1.s390x", product: { name: "apache2-devel-2.4.33-3.15.1.s390x", product_id: "apache2-devel-2.4.33-3.15.1.s390x", }, }, { category: "product_version", name: "apache2-event-2.4.33-3.15.1.s390x", product: { name: "apache2-event-2.4.33-3.15.1.s390x", product_id: "apache2-event-2.4.33-3.15.1.s390x", }, }, { category: "product_version", name: "apache2-example-pages-2.4.33-3.15.1.s390x", product: { name: "apache2-example-pages-2.4.33-3.15.1.s390x", product_id: "apache2-example-pages-2.4.33-3.15.1.s390x", }, }, { category: "product_version", name: "apache2-prefork-2.4.33-3.15.1.s390x", product: { name: "apache2-prefork-2.4.33-3.15.1.s390x", product_id: "apache2-prefork-2.4.33-3.15.1.s390x", }, }, { category: "product_version", name: "apache2-utils-2.4.33-3.15.1.s390x", product: { name: "apache2-utils-2.4.33-3.15.1.s390x", product_id: "apache2-utils-2.4.33-3.15.1.s390x", }, }, { category: "product_version", name: "apache2-worker-2.4.33-3.15.1.s390x", product: { name: "apache2-worker-2.4.33-3.15.1.s390x", product_id: "apache2-worker-2.4.33-3.15.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "apache2-2.4.33-3.15.1.x86_64", product: { name: "apache2-2.4.33-3.15.1.x86_64", product_id: "apache2-2.4.33-3.15.1.x86_64", }, }, { category: "product_version", name: "apache2-devel-2.4.33-3.15.1.x86_64", product: { name: "apache2-devel-2.4.33-3.15.1.x86_64", product_id: "apache2-devel-2.4.33-3.15.1.x86_64", }, }, { category: "product_version", name: "apache2-event-2.4.33-3.15.1.x86_64", product: { name: "apache2-event-2.4.33-3.15.1.x86_64", product_id: "apache2-event-2.4.33-3.15.1.x86_64", }, }, { category: "product_version", name: "apache2-example-pages-2.4.33-3.15.1.x86_64", product: { name: "apache2-example-pages-2.4.33-3.15.1.x86_64", product_id: "apache2-example-pages-2.4.33-3.15.1.x86_64", }, }, { category: "product_version", name: "apache2-prefork-2.4.33-3.15.1.x86_64", product: { name: "apache2-prefork-2.4.33-3.15.1.x86_64", product_id: "apache2-prefork-2.4.33-3.15.1.x86_64", }, }, { category: "product_version", name: "apache2-utils-2.4.33-3.15.1.x86_64", product: { name: "apache2-utils-2.4.33-3.15.1.x86_64", product_id: "apache2-utils-2.4.33-3.15.1.x86_64", }, }, { category: "product_version", name: "apache2-worker-2.4.33-3.15.1.x86_64", product: { name: "apache2-worker-2.4.33-3.15.1.x86_64", product_id: "apache2-worker-2.4.33-3.15.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Server Applications 15", product: { name: "SUSE Linux Enterprise Module for Server Applications 15", product_id: "SUSE Linux Enterprise Module for Server Applications 15", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-server-applications:15", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "apache2-2.4.33-3.15.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15", product_id: "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.aarch64", }, product_reference: "apache2-2.4.33-3.15.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Server Applications 15", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.33-3.15.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15", product_id: "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.ppc64le", }, product_reference: "apache2-2.4.33-3.15.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Server Applications 15", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.33-3.15.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15", product_id: "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.s390x", }, product_reference: "apache2-2.4.33-3.15.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Server Applications 15", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.33-3.15.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15", product_id: "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.x86_64", }, product_reference: "apache2-2.4.33-3.15.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Server Applications 15", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.33-3.15.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15", product_id: "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.aarch64", }, product_reference: "apache2-devel-2.4.33-3.15.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Server Applications 15", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.33-3.15.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15", product_id: "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.ppc64le", }, product_reference: "apache2-devel-2.4.33-3.15.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Server Applications 15", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.33-3.15.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15", product_id: "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.s390x", }, product_reference: "apache2-devel-2.4.33-3.15.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Server Applications 15", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.33-3.15.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15", product_id: "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.x86_64", }, product_reference: "apache2-devel-2.4.33-3.15.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Server Applications 15", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.33-3.15.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15", product_id: "SUSE Linux Enterprise Module for Server Applications 15:apache2-doc-2.4.33-3.15.1.noarch", }, product_reference: "apache2-doc-2.4.33-3.15.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Server Applications 15", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.33-3.15.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15", product_id: "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.aarch64", }, product_reference: "apache2-prefork-2.4.33-3.15.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Server Applications 15", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.33-3.15.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15", product_id: "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.ppc64le", }, product_reference: "apache2-prefork-2.4.33-3.15.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Server Applications 15", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.33-3.15.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15", product_id: "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.s390x", }, product_reference: "apache2-prefork-2.4.33-3.15.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Server Applications 15", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.33-3.15.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15", product_id: "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.x86_64", }, product_reference: "apache2-prefork-2.4.33-3.15.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Server Applications 15", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.33-3.15.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15", product_id: "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.aarch64", }, product_reference: "apache2-utils-2.4.33-3.15.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Server Applications 15", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.33-3.15.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15", product_id: "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.ppc64le", }, product_reference: "apache2-utils-2.4.33-3.15.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Server Applications 15", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.33-3.15.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15", product_id: "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.s390x", }, product_reference: "apache2-utils-2.4.33-3.15.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Server Applications 15", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.33-3.15.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15", product_id: "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.x86_64", }, product_reference: "apache2-utils-2.4.33-3.15.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Server Applications 15", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.33-3.15.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15", product_id: "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.aarch64", }, product_reference: "apache2-worker-2.4.33-3.15.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Server Applications 15", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.33-3.15.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15", product_id: "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.ppc64le", }, product_reference: "apache2-worker-2.4.33-3.15.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Server Applications 15", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.33-3.15.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15", product_id: "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.s390x", }, product_reference: "apache2-worker-2.4.33-3.15.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Server Applications 15", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.33-3.15.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15", product_id: "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.x86_64", }, product_reference: "apache2-worker-2.4.33-3.15.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Server Applications 15", }, ], }, vulnerabilities: [ { cve: "CVE-2019-0196", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-0196", }, ], notes: [ { category: "general", text: "A vulnerability was found in Apache HTTP Server 2.4.17 to 2.4.38. Using fuzzed network input, the http/2 request handling could be made to access freed memory in string comparison when determining the method of a request and thus process the request incorrectly.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-doc-2.4.33-3.15.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-0196", url: "https://www.suse.com/security/cve/CVE-2019-0196", }, { category: "external", summary: "SUSE Bug 1131237 for CVE-2019-0196", url: "https://bugzilla.suse.com/1131237", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-doc-2.4.33-3.15.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-doc-2.4.33-3.15.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-04-04T12:22:41Z", details: "moderate", }, ], title: "CVE-2019-0196", }, { cve: "CVE-2019-0197", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-0197", }, ], notes: [ { category: "general", text: "A vulnerability was found in Apache HTTP Server 2.4.34 to 2.4.38. When HTTP/2 was enabled for a http: host or H2Upgrade was enabled for h2 on a https: host, an Upgrade request from http/1.1 to http/2 that was not the first request on a connection could lead to a misconfiguration and crash. Server that never enabled the h2 protocol or that only enabled it for https: and did not set \"H2Upgrade on\" are unaffected by this issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-doc-2.4.33-3.15.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-0197", url: "https://www.suse.com/security/cve/CVE-2019-0197", }, { category: "external", summary: "SUSE Bug 1131245 for CVE-2019-0197", url: "https://bugzilla.suse.com/1131245", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-doc-2.4.33-3.15.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-doc-2.4.33-3.15.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-04-04T12:22:41Z", details: "moderate", }, ], title: "CVE-2019-0197", }, { cve: "CVE-2019-0211", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-0211", }, ], notes: [ { category: "general", text: "In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-doc-2.4.33-3.15.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-0211", url: "https://www.suse.com/security/cve/CVE-2019-0211", }, { category: "external", summary: "SUSE Bug 1131233 for CVE-2019-0211", url: "https://bugzilla.suse.com/1131233", }, { category: "external", summary: "SUSE Bug 1132978 for CVE-2019-0211", url: "https://bugzilla.suse.com/1132978", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-doc-2.4.33-3.15.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-doc-2.4.33-3.15.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-04-04T12:22:41Z", details: "important", }, ], title: "CVE-2019-0211", }, { cve: "CVE-2019-0217", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-0217", }, ], notes: [ { category: "general", text: "In Apache HTTP Server 2.4 release 2.4.38 and prior, a race condition in mod_auth_digest when running in a threaded server could allow a user with valid credentials to authenticate using another username, bypassing configured access control restrictions.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-doc-2.4.33-3.15.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-0217", url: "https://www.suse.com/security/cve/CVE-2019-0217", }, { category: "external", summary: "SUSE Bug 1131239 for CVE-2019-0217", url: "https://bugzilla.suse.com/1131239", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-doc-2.4.33-3.15.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-doc-2.4.33-3.15.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-04-04T12:22:41Z", details: "moderate", }, ], title: "CVE-2019-0217", }, { cve: "CVE-2019-0220", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-0220", }, ], notes: [ { category: "general", text: "A vulnerability was found in Apache HTTP Server 2.4.0 to 2.4.38. When the path component of a request URL contains multiple consecutive slashes ('/'), directives such as LocationMatch and RewriteRule must account for duplicates in regular expressions while other aspects of the servers processing will implicitly collapse them.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-doc-2.4.33-3.15.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-0220", url: "https://www.suse.com/security/cve/CVE-2019-0220", }, { category: "external", summary: "SUSE Bug 1131241 for CVE-2019-0220", url: "https://bugzilla.suse.com/1131241", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-doc-2.4.33-3.15.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-doc-2.4.33-3.15.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.15.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-04-04T12:22:41Z", details: "moderate", }, ], title: "CVE-2019-0220", }, ], }
ghsa-w9rc-q752-88hf
Vulnerability from github
In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected.
{ affected: [], aliases: [ "CVE-2019-0211", ], database_specific: { cwe_ids: [ "CWE-416", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2019-04-08T22:29:00Z", severity: "HIGH", }, details: "In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected.", id: "GHSA-w9rc-q752-88hf", modified: "2024-07-25T15:30:35Z", published: "2022-05-13T01:09:38Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-0211", }, { type: "WEB", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN", }, { type: "WEB", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT", }, { type: "WEB", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7", }, { type: "WEB", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN", }, { type: "WEB", url: "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E", }, { type: "WEB", url: "https://access.redhat.com/errata/RHBA-2019:0959", }, { type: "WEB", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7", }, { type: "WEB", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT", }, { type: "WEB", url: "https://seclists.org/bugtraq/2019/Apr/16", }, { type: "WEB", url: "https://seclists.org/bugtraq/2019/Apr/5", }, { type: "WEB", url: "https://security.gentoo.org/glsa/201904-20", }, { type: "WEB", url: "https://security.netapp.com/advisory/ntap-20190423-0001", }, { type: "WEB", url: "https://support.f5.com/csp/article/K32957101", }, { type: "WEB", url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us", }, { type: "WEB", url: "https://usn.ubuntu.com/3937-1", }, { type: "WEB", url: "https://www.debian.org/security/2019/dsa-4422", }, { type: "WEB", url: "https://www.exploit-db.com/exploits/46676", }, { type: "WEB", url: "https://www.oracle.com/security-alerts/cpuapr2020.html", }, { type: "WEB", url: "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html", }, { type: "WEB", url: "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", }, { type: "WEB", url: "https://www.synology.com/security/advisory/Synology_SA_19_14", }, { type: "WEB", url: "https://access.redhat.com/errata/RHSA-2019:0746", }, { type: "WEB", url: "https://access.redhat.com/errata/RHSA-2019:0980", }, { type: "WEB", url: "https://access.redhat.com/errata/RHSA-2019:1296", }, { type: "WEB", url: "https://access.redhat.com/errata/RHSA-2019:1297", }, { type: "WEB", url: "https://access.redhat.com/errata/RHSA-2019:1543", }, { type: "WEB", url: "https://httpd.apache.org/security/vulnerabilities_24.html", }, { type: "WEB", url: "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/890507b85c30adf133216b299cc35cd8cd0346a885acfc671c04694e%40%3Cdev.community.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/890507b85c30adf133216b299cc35cd8cd0346a885acfc671c04694e@%3Cdev.community.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/b1613d44ec364c87bb7ee8c5939949f9b061c05c06e0e90098ebf7aa%40%3Cusers.httpd.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/b1613d44ec364c87bb7ee8c5939949f9b061c05c06e0e90098ebf7aa@%3Cusers.httpd.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/b2bdb308dc015e771ba79c0586b2de6fb50caa98b109833f5d4daf28%40%3Cdev.community.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/b2bdb308dc015e771ba79c0586b2de6fb50caa98b109833f5d4daf28@%3Cdev.community.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/de881a130bc9cb2f3a9ff220784520556884fb8ea80e69400a45509e%40%3Cdev.community.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/de881a130bc9cb2f3a9ff220784520556884fb8ea80e69400a45509e@%3Cdev.community.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/fd110f4ace2d8364c7d9190e1993cde92f79e4eb85576ed9285686ac%40%3Ccvs.httpd.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/fd110f4ace2d8364c7d9190e1993cde92f79e4eb85576ed9285686ac@%3Ccvs.httpd.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E", }, { type: "WEB", url: "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00051.html", }, { type: "WEB", url: "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00061.html", }, { type: "WEB", url: "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html", }, { type: "WEB", url: "http://packetstormsecurity.com/files/152386/Apache-2.4.38-Root-Privilege-Escalation.html", }, { type: "WEB", url: "http://packetstormsecurity.com/files/152415/Slackware-Security-Advisory-httpd-Updates.html", }, { type: "WEB", url: "http://packetstormsecurity.com/files/152441/CARPE-DIEM-Apache-2.4.x-Local-Privilege-Escalation.html", }, { type: "WEB", url: "http://www.apache.org/dist/httpd/CHANGES_2.4.39", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2019/04/02/3", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2019/07/26/7", }, { type: "WEB", url: "http://www.securityfocus.com/bid/107666", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", type: "CVSS_V3", }, ], }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.