Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-0215 (GCVE-0-2019-0215)
Vulnerability from cvelistv5
Published
2019-04-08 19:25
Modified
2024-08-04 17:44
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Access Control Bypass
Summary
In Apache HTTP Server 2.4 releases 2.4.37 and 2.4.38, a bug in mod_ssl when using per-location client certificate verification with TLSv1.3 allowed a client to bypass configured access control restrictions.
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Apache | Apache HTTP Server |
Version: 2.4.37 Version: 2.4.38 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T17:44:15.365Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "[oss-security] 20190401 CVE-2019-0215: mod_ssl access control bypass",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2019/04/02/4"
},
{
"name": "[httpd-cvs] 20190402 svn commit: r1856807 - /httpd/test/framework/trunk/t/security/CVE-2019-0215.t",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/2d6bd429a0ba9af1580da896575cfca6e42bb05e7536562d4b095fcf%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "107667",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/107667"
},
{
"name": "FEDORA-2019-cf7695b470",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/"
},
{
"name": "FEDORA-2019-119b14075a",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.f5.com/csp/article/K59440504"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20190423-0001/"
},
{
"name": "RHSA-2019:0980",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2019:0980"
},
{
"name": "FEDORA-2019-a4ed7400f4",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"
},
{
"name": "[httpd-dev] 20190804 Re: svn commit: r1856807 - /httpd/test/framework/trunk/t/security/CVE-2019-0215.t",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/117bc3f09847ebf020b1bb70301ebcc105ddc446856150b63f37f8eb%40%3Cdev.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20190806 svn commit: r1864463 - /httpd/test/framework/trunk/t/security/CVE-2019-0215.t",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/bc1a6d4137798565ab02e60079b6788442147f4efeb4200c665bed5b%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-dev] 20190806 Re: svn commit: r1856807 - /httpd/test/framework/trunk/t/security/CVE-2019-0215.t",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/5b1e7d66c5adf286f14f6cc0f857b6fca107444f68aed9e70eedab47%40%3Cdev.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.oracle.com/security-alerts/cpujan2020.html"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073149 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Apache HTTP Server",
"vendor": "Apache",
"versions": [
{
"status": "affected",
"version": "2.4.37"
},
{
"status": "affected",
"version": "2.4.38"
}
]
}
],
"datePublic": "2019-04-01T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "In Apache HTTP Server 2.4 releases 2.4.37 and 2.4.38, a bug in mod_ssl when using per-location client certificate verification with TLSv1.3 allowed a client to bypass configured access control restrictions."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Access Control Bypass",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-06-06T10:11:45",
"orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
"shortName": "apache"
},
"references": [
{
"name": "[oss-security] 20190401 CVE-2019-0215: mod_ssl access control bypass",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2019/04/02/4"
},
{
"name": "[httpd-cvs] 20190402 svn commit: r1856807 - /httpd/test/framework/trunk/t/security/CVE-2019-0215.t",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/2d6bd429a0ba9af1580da896575cfca6e42bb05e7536562d4b095fcf%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "107667",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/107667"
},
{
"name": "FEDORA-2019-cf7695b470",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/"
},
{
"name": "FEDORA-2019-119b14075a",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.f5.com/csp/article/K59440504"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security.netapp.com/advisory/ntap-20190423-0001/"
},
{
"name": "RHSA-2019:0980",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2019:0980"
},
{
"name": "FEDORA-2019-a4ed7400f4",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"
},
{
"name": "[httpd-dev] 20190804 Re: svn commit: r1856807 - /httpd/test/framework/trunk/t/security/CVE-2019-0215.t",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/117bc3f09847ebf020b1bb70301ebcc105ddc446856150b63f37f8eb%40%3Cdev.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20190806 svn commit: r1864463 - /httpd/test/framework/trunk/t/security/CVE-2019-0215.t",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/bc1a6d4137798565ab02e60079b6788442147f4efeb4200c665bed5b%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-dev] 20190806 Re: svn commit: r1856807 - /httpd/test/framework/trunk/t/security/CVE-2019-0215.t",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/5b1e7d66c5adf286f14f6cc0f857b6fca107444f68aed9e70eedab47%40%3Cdev.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.oracle.com/security-alerts/cpujan2020.html"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073149 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@apache.org",
"ID": "CVE-2019-0215",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Apache HTTP Server",
"version": {
"version_data": [
{
"version_value": "2.4.37"
},
{
"version_value": "2.4.38"
}
]
}
}
]
},
"vendor_name": "Apache"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In Apache HTTP Server 2.4 releases 2.4.37 and 2.4.38, a bug in mod_ssl when using per-location client certificate verification with TLSv1.3 allowed a client to bypass configured access control restrictions."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Access Control Bypass"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20190401 CVE-2019-0215: mod_ssl access control bypass",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2019/04/02/4"
},
{
"name": "[httpd-cvs] 20190402 svn commit: r1856807 - /httpd/test/framework/trunk/t/security/CVE-2019-0215.t",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/2d6bd429a0ba9af1580da896575cfca6e42bb05e7536562d4b095fcf@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "107667",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/107667"
},
{
"name": "FEDORA-2019-cf7695b470",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/"
},
{
"name": "FEDORA-2019-119b14075a",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/"
},
{
"name": "https://httpd.apache.org/security/vulnerabilities_24.html",
"refsource": "MISC",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
},
{
"name": "https://support.f5.com/csp/article/K59440504",
"refsource": "CONFIRM",
"url": "https://support.f5.com/csp/article/K59440504"
},
{
"name": "https://security.netapp.com/advisory/ntap-20190423-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20190423-0001/"
},
{
"name": "RHSA-2019:0980",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:0980"
},
{
"name": "FEDORA-2019-a4ed7400f4",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/"
},
{
"name": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
"refsource": "MISC",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"
},
{
"name": "[httpd-dev] 20190804 Re: svn commit: r1856807 - /httpd/test/framework/trunk/t/security/CVE-2019-0215.t",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/117bc3f09847ebf020b1bb70301ebcc105ddc446856150b63f37f8eb@%3Cdev.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20190806 svn commit: r1864463 - /httpd/test/framework/trunk/t/security/CVE-2019-0215.t",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/bc1a6d4137798565ab02e60079b6788442147f4efeb4200c665bed5b@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-dev] 20190806 Re: svn commit: r1856807 - /httpd/test/framework/trunk/t/security/CVE-2019-0215.t",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/5b1e7d66c5adf286f14f6cc0f857b6fca107444f68aed9e70eedab47@%3Cdev.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
"refsource": "MISC",
"url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
},
{
"name": "https://www.oracle.com/security-alerts/cpujan2020.html",
"refsource": "MISC",
"url": "https://www.oracle.com/security-alerts/cpujan2020.html"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "https://www.oracle.com/security-alerts/cpuapr2020.html",
"refsource": "MISC",
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073149 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
"assignerShortName": "apache",
"cveId": "CVE-2019-0215",
"datePublished": "2019-04-08T19:25:45",
"dateReserved": "2018-11-14T00:00:00",
"dateUpdated": "2024-08-04T17:44:15.365Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2019-0215\",\"sourceIdentifier\":\"security@apache.org\",\"published\":\"2019-04-08T20:29:10.003\",\"lastModified\":\"2024-11-21T04:16:30.333\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In Apache HTTP Server 2.4 releases 2.4.37 and 2.4.38, a bug in mod_ssl when using per-location client certificate verification with TLSv1.3 allowed a client to bypass configured access control restrictions.\"},{\"lang\":\"es\",\"value\":\"En Apache HTTP Server 2.4, versiones 2.4.37 y 2.4.38, un error en mod_ssl al utilizar la verificaci\u00f3n de certificados de cliente por ubicaci\u00f3n con TLSv1.3 permit\u00eda a un cliente eludir las restricciones de control de acceso configuradas.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.6,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:S/C:P/I:P/A:P\",\"baseScore\":6.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":6.8,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.4.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE5F8320-A680-4E2F-B32F-F7DBEED09ED6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.4.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"033F6E44-5230-4D11-883C-591D7FC21F36\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D100F7CE-FC64-4CC6-852A-6136D72DA419\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97A4B8DF-58DA-4AB6-A1F9-331B36409BA3\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2019/04/02/4\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\",\"Mitigation\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/107667\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:0980\",\"source\":\"security@apache.org\"},{\"url\":\"https://httpd.apache.org/security/vulnerabilities_24.html\",\"source\":\"security@apache.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/117bc3f09847ebf020b1bb70301ebcc105ddc446856150b63f37f8eb%40%3Cdev.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/2d6bd429a0ba9af1580da896575cfca6e42bb05e7536562d4b095fcf%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/5b1e7d66c5adf286f14f6cc0f857b6fca107444f68aed9e70eedab47%40%3Cdev.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/bc1a6d4137798565ab02e60079b6788442147f4efeb4200c665bed5b%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/\",\"source\":\"security@apache.org\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20190423-0001/\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K59440504\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuapr2020.html\",\"source\":\"security@apache.org\"},{\"url\":\"https://www.oracle.com/security-alerts/cpujan2020.html\",\"source\":\"security@apache.org\"},{\"url\":\"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html\",\"source\":\"security@apache.org\"},{\"url\":\"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html\",\"source\":\"security@apache.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2019/04/02/4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Mitigation\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/107667\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:0980\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://httpd.apache.org/security/vulnerabilities_24.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/117bc3f09847ebf020b1bb70301ebcc105ddc446856150b63f37f8eb%40%3Cdev.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/2d6bd429a0ba9af1580da896575cfca6e42bb05e7536562d4b095fcf%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/5b1e7d66c5adf286f14f6cc0f857b6fca107444f68aed9e70eedab47%40%3Cdev.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/bc1a6d4137798565ab02e60079b6788442147f4efeb4200c665bed5b%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20190423-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K59440504\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuapr2020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.oracle.com/security-alerts/cpujan2020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
RHSA-2019:0980
Vulnerability from csaf_redhat
Published
2019-05-07 04:19
Modified
2025-10-09 18:56
Summary
Red Hat Security Advisory: httpd:2.4 security update
Notes
Topic
An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: privilege escalation from modules scripts (CVE-2019-0211)
* httpd: mod_ssl: access control bypass when using per-location client certification authentication (CVE-2019-0215)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: privilege escalation from modules scripts (CVE-2019-0211)\n\n* httpd: mod_ssl: access control bypass when using per-location client certification authentication (CVE-2019-0215)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:0980",
"url": "https://access.redhat.com/errata/RHSA-2019:0980"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1694980",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1694980"
},
{
"category": "external",
"summary": "1695025",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695025"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_0980.json"
}
],
"title": "Red Hat Security Advisory: httpd:2.4 security update",
"tracking": {
"current_release_date": "2025-10-09T18:56:54+00:00",
"generator": {
"date": "2025-10-09T18:56:54+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:0980",
"initial_release_date": "2019-05-07T04:19:52+00:00",
"revision_history": [
{
"date": "2019-05-07T04:19:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-05-07T04:19:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:56:54+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product": {
"name": "httpd-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4)",
"product_id": "httpd-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product": {
"name": "httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4)",
"product_id": "httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product": {
"name": "httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4)",
"product_id": "httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product": {
"name": "httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4)",
"product_id": "httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product": {
"name": "httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4)",
"product_id": "httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product": {
"name": "httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4)",
"product_id": "httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product": {
"name": "mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4)",
"product_id": "mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product": {
"name": "mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4)",
"product_id": "mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product": {
"name": "mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4)",
"product_id": "mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product": {
"name": "mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4)",
"product_id": "mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product": {
"name": "mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4)",
"product_id": "mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_md-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product": {
"name": "mod_md-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4)",
"product_id": "mod_md-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product": {
"name": "mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4)",
"product_id": "mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product": {
"name": "mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4)",
"product_id": "mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product": {
"name": "mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4)",
"product_id": "mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_session-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product": {
"name": "mod_session-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4)",
"product_id": "mod_session-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product": {
"name": "mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4)",
"product_id": "mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product": {
"name": "mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4)",
"product_id": "mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product": {
"name": "mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4)",
"product_id": "mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-2.4.37-11.module+el8.0.0+2969+90015743.src.rpm-httpd:2.4",
"product": {
"name": "httpd-2.4.37-11.module+el8.0.0+2969+90015743.src.rpm (httpd:2.4)",
"product_id": "httpd-2.4.37-11.module+el8.0.0+2969+90015743.src.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=src\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.src.rpm-httpd:2.4",
"product": {
"name": "mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.src.rpm (httpd:2.4)",
"product_id": "mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.src.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=src\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-filesystem-2.4.37-11.module+el8.0.0+2969+90015743.noarch.rpm-httpd:2.4",
"product": {
"name": "httpd-filesystem-2.4.37-11.module+el8.0.0+2969+90015743.noarch.rpm (httpd:2.4)",
"product_id": "httpd-filesystem-2.4.37-11.module+el8.0.0+2969+90015743.noarch.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=noarch\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-2.4.37-11.module+el8.0.0+2969+90015743.noarch.rpm-httpd:2.4",
"product": {
"name": "httpd-manual-2.4.37-11.module+el8.0.0+2969+90015743.noarch.rpm (httpd:2.4)",
"product_id": "httpd-manual-2.4.37-11.module+el8.0.0+2969+90015743.noarch.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=noarch\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product": {
"name": "httpd-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4)",
"product_id": "httpd-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product": {
"name": "httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4)",
"product_id": "httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product": {
"name": "httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4)",
"product_id": "httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product": {
"name": "httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4)",
"product_id": "httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product": {
"name": "httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4)",
"product_id": "httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product": {
"name": "httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4)",
"product_id": "httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product": {
"name": "mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4)",
"product_id": "mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product": {
"name": "mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4)",
"product_id": "mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product": {
"name": "mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4)",
"product_id": "mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product": {
"name": "mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4)",
"product_id": "mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product": {
"name": "mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4)",
"product_id": "mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_md-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product": {
"name": "mod_md-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4)",
"product_id": "mod_md-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product": {
"name": "mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4)",
"product_id": "mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product": {
"name": "mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4)",
"product_id": "mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product": {
"name": "mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4)",
"product_id": "mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_session-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product": {
"name": "mod_session-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4)",
"product_id": "mod_session-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product": {
"name": "mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4)",
"product_id": "mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product": {
"name": "mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4)",
"product_id": "mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product": {
"name": "mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4)",
"product_id": "mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product": {
"name": "httpd-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4)",
"product_id": "httpd-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product": {
"name": "httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4)",
"product_id": "httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product": {
"name": "httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4)",
"product_id": "httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product": {
"name": "httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4)",
"product_id": "httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product": {
"name": "httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4)",
"product_id": "httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product": {
"name": "httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4)",
"product_id": "httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product": {
"name": "mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4)",
"product_id": "mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product": {
"name": "mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4)",
"product_id": "mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product": {
"name": "mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4)",
"product_id": "mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product": {
"name": "mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4)",
"product_id": "mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product": {
"name": "mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4)",
"product_id": "mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_md-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product": {
"name": "mod_md-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4)",
"product_id": "mod_md-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product": {
"name": "mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4)",
"product_id": "mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product": {
"name": "mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4)",
"product_id": "mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product": {
"name": "mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4)",
"product_id": "mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_session-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product": {
"name": "mod_session-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4)",
"product_id": "mod_session-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product": {
"name": "mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4)",
"product_id": "mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product": {
"name": "mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4)",
"product_id": "mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product": {
"name": "mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4)",
"product_id": "mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product": {
"name": "httpd-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4)",
"product_id": "httpd-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product": {
"name": "httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4)",
"product_id": "httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product": {
"name": "httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4)",
"product_id": "httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product": {
"name": "httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4)",
"product_id": "httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product": {
"name": "httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4)",
"product_id": "httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product": {
"name": "httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4)",
"product_id": "httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product": {
"name": "mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4)",
"product_id": "mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product": {
"name": "mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4)",
"product_id": "mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product": {
"name": "mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4)",
"product_id": "mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product": {
"name": "mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4)",
"product_id": "mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product": {
"name": "mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4)",
"product_id": "mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_md-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product": {
"name": "mod_md-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4)",
"product_id": "mod_md-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product": {
"name": "mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4)",
"product_id": "mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product": {
"name": "mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4)",
"product_id": "mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product": {
"name": "mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4)",
"product_id": "mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_session-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product": {
"name": "mod_session-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4)",
"product_id": "mod_session-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product": {
"name": "mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4)",
"product_id": "mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product": {
"name": "mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4)",
"product_id": "mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product": {
"name": "mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4)",
"product_id": "mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4"
},
"product_reference": "httpd-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4"
},
"product_reference": "httpd-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4"
},
"product_reference": "httpd-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-2.4.37-11.module+el8.0.0+2969+90015743.src.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.src.rpm-httpd:2.4"
},
"product_reference": "httpd-2.4.37-11.module+el8.0.0+2969+90015743.src.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4"
},
"product_reference": "httpd-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4"
},
"product_reference": "httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4"
},
"product_reference": "httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4"
},
"product_reference": "httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4"
},
"product_reference": "httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4"
},
"product_reference": "httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4"
},
"product_reference": "httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4"
},
"product_reference": "httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4"
},
"product_reference": "httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4"
},
"product_reference": "httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4"
},
"product_reference": "httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4"
},
"product_reference": "httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4"
},
"product_reference": "httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-filesystem-2.4.37-11.module+el8.0.0+2969+90015743.noarch.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-filesystem-2.4.37-11.module+el8.0.0+2969+90015743.noarch.rpm-httpd:2.4"
},
"product_reference": "httpd-filesystem-2.4.37-11.module+el8.0.0+2969+90015743.noarch.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-2.4.37-11.module+el8.0.0+2969+90015743.noarch.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-manual-2.4.37-11.module+el8.0.0+2969+90015743.noarch.rpm-httpd:2.4"
},
"product_reference": "httpd-manual-2.4.37-11.module+el8.0.0+2969+90015743.noarch.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4"
},
"product_reference": "httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4"
},
"product_reference": "httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4"
},
"product_reference": "httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4"
},
"product_reference": "httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4"
},
"product_reference": "httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4"
},
"product_reference": "httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4"
},
"product_reference": "httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4"
},
"product_reference": "httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4"
},
"product_reference": "mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4"
},
"product_reference": "mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4"
},
"product_reference": "mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.src.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.src.rpm-httpd:2.4"
},
"product_reference": "mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.src.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4"
},
"product_reference": "mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4"
},
"product_reference": "mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4"
},
"product_reference": "mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4"
},
"product_reference": "mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4"
},
"product_reference": "mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4"
},
"product_reference": "mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4"
},
"product_reference": "mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4"
},
"product_reference": "mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4"
},
"product_reference": "mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4"
},
"product_reference": "mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4"
},
"product_reference": "mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4"
},
"product_reference": "mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4"
},
"product_reference": "mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4"
},
"product_reference": "mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4"
},
"product_reference": "mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4"
},
"product_reference": "mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4"
},
"product_reference": "mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4"
},
"product_reference": "mod_md-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4"
},
"product_reference": "mod_md-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4"
},
"product_reference": "mod_md-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4"
},
"product_reference": "mod_md-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4"
},
"product_reference": "mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4"
},
"product_reference": "mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4"
},
"product_reference": "mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4"
},
"product_reference": "mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4"
},
"product_reference": "mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4"
},
"product_reference": "mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4"
},
"product_reference": "mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4"
},
"product_reference": "mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4"
},
"product_reference": "mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4"
},
"product_reference": "mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4"
},
"product_reference": "mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4"
},
"product_reference": "mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4"
},
"product_reference": "mod_session-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4"
},
"product_reference": "mod_session-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4"
},
"product_reference": "mod_session-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4"
},
"product_reference": "mod_session-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4"
},
"product_reference": "mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4"
},
"product_reference": "mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4"
},
"product_reference": "mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4"
},
"product_reference": "mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4"
},
"product_reference": "mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4"
},
"product_reference": "mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4"
},
"product_reference": "mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4"
},
"product_reference": "mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4"
},
"product_reference": "mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4"
},
"product_reference": "mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4"
},
"product_reference": "mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4"
},
"product_reference": "mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-0211",
"cwe": {
"id": "CWE-250",
"name": "Execution with Unnecessary Privileges"
},
"discovery_date": "2019-04-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1694980"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache where code executing in a less-privileged child process or thread could execute arbitrary code with the privilege of the parent process (usually root). An attacker having access to run arbitrary scripts on the web server (PHP, CGI etc) could use this flaw to run code on the web server with root privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: privilege escalation from modules scripts",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is exploitable in httpd if it is configured to allow an untrusted user to upload and execute arbitrary scripts. Due to the nature of the flaw, the uploaded script would not run as a restricted privileged user, but rather it runs as root allowing for privilege escalation from the restricted user to root on the web server. \n\nDepending on the configuration of the server, you would need local (AV:L) privileges to place the script or network (AV:N) privileges if the server ran an application that permitted uploading scripts directly. The latter scenario is not common for unauthenticated users. Once the attacker can place the script somewhere in the web root where it can be easily exploited (AC:L). This type of setup is more common in shared hosted environments (PR:L) and would allow an attacker with access to a site on the shared hosted to impact the confidentiality, integrity, and availability (CIA:H) with no interaction (UI:N). Due to the elevated privileges obtained, there is an impact to the system beyond the web server itself (S:C).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.src.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-filesystem-2.4.37-11.module+el8.0.0+2969+90015743.noarch.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-manual-2.4.37-11.module+el8.0.0+2969+90015743.noarch.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.src.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0211"
},
{
"category": "external",
"summary": "RHBZ#1694980",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1694980"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0211",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0211"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0211",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0211"
},
{
"category": "external",
"summary": "http://www.apache.org/dist/httpd/CHANGES_2.4",
"url": "http://www.apache.org/dist/httpd/CHANGES_2.4"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2019-04-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-05-07T04:19:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
"product_ids": [
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.src.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-filesystem-2.4.37-11.module+el8.0.0+2969+90015743.noarch.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-manual-2.4.37-11.module+el8.0.0+2969+90015743.noarch.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.src.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:0980"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.src.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-filesystem-2.4.37-11.module+el8.0.0+2969+90015743.noarch.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-manual-2.4.37-11.module+el8.0.0+2969+90015743.noarch.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.src.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2021-11-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "httpd: privilege escalation from modules scripts"
},
{
"cve": "CVE-2019-0215",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2019-04-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1695025"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache HTTP Server 2.4 (releases 2.4.37 and 2.4.38). A bug in mod_ssl, when using per-location client certificate verification with TLSv1.3, allowed a client supporting Post-Handshake Authentication to bypass configured access control restrictions. An attacker could perform various unauthorized actions after bypassing the restrictions. The highest threat from this vulnerability is to data confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: mod_ssl: access control bypass when using per-location client certification authentication",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw can be exploited for httpd configurations where per-location client certificates are enabled and TLS 1.3 is used. \n\nThe attacker can remotely exploit this httpd flaw (AV:N). However the server had to be configured to use per-location client certificate and the attacker needs to have access to the authenticating client certificate (AC:H). No other significant privileges are required by the attacker (PR:L). The result of the attack is bypass of the configured access control restrictions (CI:H). This however does not affect the system beyond the web server itself (S:U).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.src.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-filesystem-2.4.37-11.module+el8.0.0+2969+90015743.noarch.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-manual-2.4.37-11.module+el8.0.0+2969+90015743.noarch.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.src.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0215"
},
{
"category": "external",
"summary": "RHBZ#1695025",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695025"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0215"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0215",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0215"
},
{
"category": "external",
"summary": "http://www.apache.org/dist/httpd/CHANGES_2.4",
"url": "http://www.apache.org/dist/httpd/CHANGES_2.4"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2019-04-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-05-07T04:19:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
"product_ids": [
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.src.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-filesystem-2.4.37-11.module+el8.0.0+2969+90015743.noarch.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-manual-2.4.37-11.module+el8.0.0+2969+90015743.noarch.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.src.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:0980"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.src.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-filesystem-2.4.37-11.module+el8.0.0+2969+90015743.noarch.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-manual-2.4.37-11.module+el8.0.0+2969+90015743.noarch.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.src.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "httpd: mod_ssl: access control bypass when using per-location client certification authentication"
}
]
}
rhsa-2019_0980
Vulnerability from csaf_redhat
Published
2019-05-07 04:19
Modified
2024-11-22 12:56
Summary
Red Hat Security Advisory: httpd:2.4 security update
Notes
Topic
An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: privilege escalation from modules scripts (CVE-2019-0211)
* httpd: mod_ssl: access control bypass when using per-location client certification authentication (CVE-2019-0215)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: privilege escalation from modules scripts (CVE-2019-0211)\n\n* httpd: mod_ssl: access control bypass when using per-location client certification authentication (CVE-2019-0215)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:0980",
"url": "https://access.redhat.com/errata/RHSA-2019:0980"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1694980",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1694980"
},
{
"category": "external",
"summary": "1695025",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695025"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_0980.json"
}
],
"title": "Red Hat Security Advisory: httpd:2.4 security update",
"tracking": {
"current_release_date": "2024-11-22T12:56:59+00:00",
"generator": {
"date": "2024-11-22T12:56:59+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2019:0980",
"initial_release_date": "2019-05-07T04:19:52+00:00",
"revision_history": [
{
"date": "2019-05-07T04:19:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-05-07T04:19:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T12:56:59+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd:2.4:8000020190405071959:55190bc5",
"product": {
"name": "httpd:2.4:8000020190405071959:55190bc5",
"product_id": "httpd:2.4:8000020190405071959:55190bc5",
"product_identification_helper": {
"purl": "pkg:rpmmod/redhat/httpd@2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch",
"product": {
"name": "httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch",
"product_id": "httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch",
"product": {
"name": "httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch",
"product_id": "httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"product": {
"name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"product_id": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"product": {
"name": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"product_id": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"product": {
"name": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"product_id": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"product": {
"name": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"product_id": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"product": {
"name": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"product_id": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"product": {
"name": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"product_id": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x",
"product": {
"name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x",
"product_id": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x",
"product": {
"name": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x",
"product_id": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x",
"product": {
"name": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x",
"product_id": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"product": {
"name": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"product_id": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"product": {
"name": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"product_id": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"product": {
"name": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"product_id": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"product": {
"name": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"product_id": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"product": {
"name": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"product_id": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"product": {
"name": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"product_id": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"product": {
"name": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"product_id": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"product": {
"name": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"product_id": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"product": {
"name": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"product_id": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"product": {
"name": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"product_id": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src",
"product": {
"name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src",
"product_id": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=src"
}
}
},
{
"category": "product_version",
"name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src",
"product": {
"name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src",
"product_id": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"product": {
"name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"product_id": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"product": {
"name": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"product_id": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"product": {
"name": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"product_id": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"product": {
"name": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"product_id": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"product": {
"name": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"product_id": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"product": {
"name": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"product_id": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64",
"product": {
"name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64",
"product_id": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64",
"product": {
"name": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64",
"product_id": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64",
"product": {
"name": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64",
"product_id": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"product": {
"name": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"product_id": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"product": {
"name": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"product_id": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"product": {
"name": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"product_id": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"product": {
"name": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"product_id": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"product": {
"name": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"product_id": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"product": {
"name": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"product_id": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"product": {
"name": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"product_id": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"product": {
"name": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"product_id": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"product": {
"name": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"product_id": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"product": {
"name": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"product_id": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"product": {
"name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"product_id": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"product": {
"name": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"product_id": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"product": {
"name": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"product_id": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"product": {
"name": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"product_id": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"product": {
"name": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"product_id": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"product": {
"name": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"product_id": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le",
"product": {
"name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le",
"product_id": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le",
"product": {
"name": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le",
"product_id": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le",
"product": {
"name": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le",
"product_id": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"product": {
"name": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"product_id": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"product": {
"name": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"product_id": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"product": {
"name": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"product_id": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"product": {
"name": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"product_id": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"product": {
"name": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"product_id": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"product": {
"name": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"product_id": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"product": {
"name": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"product_id": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"product": {
"name": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"product_id": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"product": {
"name": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"product_id": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"product": {
"name": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"product_id": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"product": {
"name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"product_id": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"product": {
"name": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"product_id": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"product": {
"name": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"product_id": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"product": {
"name": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"product_id": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"product": {
"name": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"product_id": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"product": {
"name": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"product_id": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64",
"product": {
"name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64",
"product_id": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64",
"product": {
"name": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64",
"product_id": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64",
"product": {
"name": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64",
"product_id": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"product": {
"name": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"product_id": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"product": {
"name": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"product_id": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"product": {
"name": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"product_id": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"product": {
"name": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"product_id": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"product": {
"name": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"product_id": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"product": {
"name": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"product_id": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"product": {
"name": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"product_id": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"product": {
"name": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"product_id": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"product": {
"name": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"product_id": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"product": {
"name": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"product_id": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
"product_reference": "httpd:2.4:8000020190405071959:55190bc5",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64"
},
"product_reference": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le"
},
"product_reference": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x"
},
"product_reference": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src"
},
"product_reference": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64"
},
"product_reference": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64"
},
"product_reference": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le"
},
"product_reference": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x"
},
"product_reference": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64"
},
"product_reference": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le"
},
"product_reference": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x"
},
"product_reference": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64"
},
"product_reference": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64"
},
"product_reference": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le"
},
"product_reference": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x"
},
"product_reference": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64"
},
"product_reference": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch"
},
"product_reference": "httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch"
},
"product_reference": "httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64"
},
"product_reference": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le"
},
"product_reference": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x"
},
"product_reference": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64"
},
"product_reference": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64"
},
"product_reference": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le"
},
"product_reference": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x"
},
"product_reference": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64"
},
"product_reference": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64"
},
"product_reference": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le"
},
"product_reference": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x"
},
"product_reference": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src"
},
"product_reference": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64"
},
"product_reference": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64"
},
"product_reference": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le"
},
"product_reference": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x"
},
"product_reference": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64"
},
"product_reference": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64"
},
"product_reference": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le"
},
"product_reference": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x"
},
"product_reference": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64"
},
"product_reference": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64"
},
"product_reference": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le"
},
"product_reference": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x"
},
"product_reference": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64"
},
"product_reference": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64"
},
"product_reference": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le"
},
"product_reference": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x"
},
"product_reference": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64"
},
"product_reference": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64"
},
"product_reference": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le"
},
"product_reference": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x"
},
"product_reference": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64"
},
"product_reference": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64"
},
"product_reference": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le"
},
"product_reference": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x"
},
"product_reference": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64"
},
"product_reference": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64"
},
"product_reference": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le"
},
"product_reference": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x"
},
"product_reference": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64"
},
"product_reference": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64"
},
"product_reference": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le"
},
"product_reference": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x"
},
"product_reference": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64"
},
"product_reference": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64"
},
"product_reference": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le"
},
"product_reference": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x"
},
"product_reference": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64"
},
"product_reference": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64"
},
"product_reference": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le"
},
"product_reference": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x"
},
"product_reference": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64"
},
"product_reference": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64"
},
"product_reference": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le"
},
"product_reference": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x"
},
"product_reference": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64"
},
"product_reference": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64"
},
"product_reference": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le"
},
"product_reference": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x"
},
"product_reference": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64"
},
"product_reference": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-0211",
"cwe": {
"id": "CWE-250",
"name": "Execution with Unnecessary Privileges"
},
"discovery_date": "2019-04-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1694980"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache where code executing in a less-privileged child process or thread could execute arbitrary code with the privilege of the parent process (usually root). An attacker having access to run arbitrary scripts on the web server (PHP, CGI etc) could use this flaw to run code on the web server with root privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: privilege escalation from modules scripts",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is exploitable in httpd if it is configured to allow an untrusted user to upload and execute arbitrary scripts. Due to the nature of the flaw, the uploaded script would not run as a restricted privileged user, but rather it runs as root allowing for privilege escalation from the restricted user to root on the web server. \n\nDepending on the configuration of the server, you would need local (AV:L) privileges to place the script or network (AV:N) privileges if the server ran an application that permitted uploading scripts directly. The latter scenario is not common for unauthenticated users. Once the attacker can place the script somewhere in the web root where it can be easily exploited (AC:L). This type of setup is more common in shared hosted environments (PR:L) and would allow an attacker with access to a site on the shared hosted to impact the confidentiality, integrity, and availability (CIA:H) with no interaction (UI:N). Due to the elevated privileges obtained, there is an impact to the system beyond the web server itself (S:C).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0211"
},
{
"category": "external",
"summary": "RHBZ#1694980",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1694980"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0211",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0211"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0211",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0211"
},
{
"category": "external",
"summary": "http://www.apache.org/dist/httpd/CHANGES_2.4",
"url": "http://www.apache.org/dist/httpd/CHANGES_2.4"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2019-04-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-05-07T04:19:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
"product_ids": [
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:0980"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2021-11-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "httpd: privilege escalation from modules scripts"
},
{
"cve": "CVE-2019-0215",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2019-04-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1695025"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache HTTP Server 2.4 (releases 2.4.37 and 2.4.38). A bug in mod_ssl, when using per-location client certificate verification with TLSv1.3, allowed a client supporting Post-Handshake Authentication to bypass configured access control restrictions. An attacker could perform various unauthorized actions after bypassing the restrictions. The highest threat from this vulnerability is to data confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: mod_ssl: access control bypass when using per-location client certification authentication",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw can be exploited for httpd configurations where per-location client certificates are enabled and TLS 1.3 is used. \n\nThe attacker can remotely exploit this httpd flaw (AV:N). However the server had to be configured to use per-location client certificate and the attacker needs to have access to the authenticating client certificate (AC:H). No other significant privileges are required by the attacker (PR:L). The result of the attack is bypass of the configured access control restrictions (CI:H). This however does not affect the system beyond the web server itself (S:U).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0215"
},
{
"category": "external",
"summary": "RHBZ#1695025",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695025"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0215"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0215",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0215"
},
{
"category": "external",
"summary": "http://www.apache.org/dist/httpd/CHANGES_2.4",
"url": "http://www.apache.org/dist/httpd/CHANGES_2.4"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2019-04-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-05-07T04:19:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
"product_ids": [
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:0980"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x",
"AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "httpd: mod_ssl: access control bypass when using per-location client certification authentication"
}
]
}
rhsa-2019:0980
Vulnerability from csaf_redhat
Published
2019-05-07 04:19
Modified
2025-10-09 18:56
Summary
Red Hat Security Advisory: httpd:2.4 security update
Notes
Topic
An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: privilege escalation from modules scripts (CVE-2019-0211)
* httpd: mod_ssl: access control bypass when using per-location client certification authentication (CVE-2019-0215)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: privilege escalation from modules scripts (CVE-2019-0211)\n\n* httpd: mod_ssl: access control bypass when using per-location client certification authentication (CVE-2019-0215)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:0980",
"url": "https://access.redhat.com/errata/RHSA-2019:0980"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1694980",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1694980"
},
{
"category": "external",
"summary": "1695025",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695025"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_0980.json"
}
],
"title": "Red Hat Security Advisory: httpd:2.4 security update",
"tracking": {
"current_release_date": "2025-10-09T18:56:54+00:00",
"generator": {
"date": "2025-10-09T18:56:54+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:0980",
"initial_release_date": "2019-05-07T04:19:52+00:00",
"revision_history": [
{
"date": "2019-05-07T04:19:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-05-07T04:19:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:56:54+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product": {
"name": "httpd-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4)",
"product_id": "httpd-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product": {
"name": "httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4)",
"product_id": "httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product": {
"name": "httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4)",
"product_id": "httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product": {
"name": "httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4)",
"product_id": "httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product": {
"name": "httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4)",
"product_id": "httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product": {
"name": "httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4)",
"product_id": "httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product": {
"name": "mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4)",
"product_id": "mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product": {
"name": "mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4)",
"product_id": "mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product": {
"name": "mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4)",
"product_id": "mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product": {
"name": "mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4)",
"product_id": "mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product": {
"name": "mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4)",
"product_id": "mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_md-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product": {
"name": "mod_md-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4)",
"product_id": "mod_md-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product": {
"name": "mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4)",
"product_id": "mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product": {
"name": "mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4)",
"product_id": "mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product": {
"name": "mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4)",
"product_id": "mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_session-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product": {
"name": "mod_session-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4)",
"product_id": "mod_session-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product": {
"name": "mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4)",
"product_id": "mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product": {
"name": "mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4)",
"product_id": "mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product": {
"name": "mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4)",
"product_id": "mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026epoch=1\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-2.4.37-11.module+el8.0.0+2969+90015743.src.rpm-httpd:2.4",
"product": {
"name": "httpd-2.4.37-11.module+el8.0.0+2969+90015743.src.rpm (httpd:2.4)",
"product_id": "httpd-2.4.37-11.module+el8.0.0+2969+90015743.src.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=src\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.src.rpm-httpd:2.4",
"product": {
"name": "mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.src.rpm (httpd:2.4)",
"product_id": "mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.src.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=src\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-filesystem-2.4.37-11.module+el8.0.0+2969+90015743.noarch.rpm-httpd:2.4",
"product": {
"name": "httpd-filesystem-2.4.37-11.module+el8.0.0+2969+90015743.noarch.rpm (httpd:2.4)",
"product_id": "httpd-filesystem-2.4.37-11.module+el8.0.0+2969+90015743.noarch.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=noarch\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-2.4.37-11.module+el8.0.0+2969+90015743.noarch.rpm-httpd:2.4",
"product": {
"name": "httpd-manual-2.4.37-11.module+el8.0.0+2969+90015743.noarch.rpm (httpd:2.4)",
"product_id": "httpd-manual-2.4.37-11.module+el8.0.0+2969+90015743.noarch.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=noarch\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product": {
"name": "httpd-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4)",
"product_id": "httpd-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product": {
"name": "httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4)",
"product_id": "httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product": {
"name": "httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4)",
"product_id": "httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product": {
"name": "httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4)",
"product_id": "httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product": {
"name": "httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4)",
"product_id": "httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product": {
"name": "httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4)",
"product_id": "httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product": {
"name": "mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4)",
"product_id": "mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product": {
"name": "mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4)",
"product_id": "mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product": {
"name": "mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4)",
"product_id": "mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product": {
"name": "mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4)",
"product_id": "mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product": {
"name": "mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4)",
"product_id": "mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_md-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product": {
"name": "mod_md-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4)",
"product_id": "mod_md-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product": {
"name": "mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4)",
"product_id": "mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product": {
"name": "mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4)",
"product_id": "mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product": {
"name": "mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4)",
"product_id": "mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_session-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product": {
"name": "mod_session-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4)",
"product_id": "mod_session-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product": {
"name": "mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4)",
"product_id": "mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product": {
"name": "mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4)",
"product_id": "mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product": {
"name": "mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4)",
"product_id": "mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026epoch=1\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product": {
"name": "httpd-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4)",
"product_id": "httpd-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product": {
"name": "httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4)",
"product_id": "httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product": {
"name": "httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4)",
"product_id": "httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product": {
"name": "httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4)",
"product_id": "httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product": {
"name": "httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4)",
"product_id": "httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product": {
"name": "httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4)",
"product_id": "httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product": {
"name": "mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4)",
"product_id": "mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product": {
"name": "mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4)",
"product_id": "mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product": {
"name": "mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4)",
"product_id": "mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product": {
"name": "mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4)",
"product_id": "mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product": {
"name": "mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4)",
"product_id": "mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_md-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product": {
"name": "mod_md-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4)",
"product_id": "mod_md-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product": {
"name": "mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4)",
"product_id": "mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product": {
"name": "mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4)",
"product_id": "mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product": {
"name": "mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4)",
"product_id": "mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_session-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product": {
"name": "mod_session-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4)",
"product_id": "mod_session-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product": {
"name": "mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4)",
"product_id": "mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product": {
"name": "mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4)",
"product_id": "mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product": {
"name": "mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4)",
"product_id": "mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026epoch=1\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product": {
"name": "httpd-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4)",
"product_id": "httpd-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product": {
"name": "httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4)",
"product_id": "httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product": {
"name": "httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4)",
"product_id": "httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product": {
"name": "httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4)",
"product_id": "httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product": {
"name": "httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4)",
"product_id": "httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product": {
"name": "httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4)",
"product_id": "httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product": {
"name": "mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4)",
"product_id": "mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product": {
"name": "mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4)",
"product_id": "mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product": {
"name": "mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4)",
"product_id": "mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product": {
"name": "mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4)",
"product_id": "mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product": {
"name": "mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4)",
"product_id": "mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_md-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product": {
"name": "mod_md-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4)",
"product_id": "mod_md-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product": {
"name": "mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4)",
"product_id": "mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product": {
"name": "mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4)",
"product_id": "mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product": {
"name": "mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4)",
"product_id": "mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_session-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product": {
"name": "mod_session-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4)",
"product_id": "mod_session-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product": {
"name": "mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4)",
"product_id": "mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product": {
"name": "mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4)",
"product_id": "mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product": {
"name": "mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4)",
"product_id": "mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026epoch=1\u0026rpmmod=httpd:2.4:8000020190405071959:55190bc5"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4"
},
"product_reference": "httpd-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4"
},
"product_reference": "httpd-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4"
},
"product_reference": "httpd-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-2.4.37-11.module+el8.0.0+2969+90015743.src.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.src.rpm-httpd:2.4"
},
"product_reference": "httpd-2.4.37-11.module+el8.0.0+2969+90015743.src.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4"
},
"product_reference": "httpd-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4"
},
"product_reference": "httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4"
},
"product_reference": "httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4"
},
"product_reference": "httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4"
},
"product_reference": "httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4"
},
"product_reference": "httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4"
},
"product_reference": "httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4"
},
"product_reference": "httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4"
},
"product_reference": "httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4"
},
"product_reference": "httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4"
},
"product_reference": "httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4"
},
"product_reference": "httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4"
},
"product_reference": "httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-filesystem-2.4.37-11.module+el8.0.0+2969+90015743.noarch.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-filesystem-2.4.37-11.module+el8.0.0+2969+90015743.noarch.rpm-httpd:2.4"
},
"product_reference": "httpd-filesystem-2.4.37-11.module+el8.0.0+2969+90015743.noarch.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-2.4.37-11.module+el8.0.0+2969+90015743.noarch.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-manual-2.4.37-11.module+el8.0.0+2969+90015743.noarch.rpm-httpd:2.4"
},
"product_reference": "httpd-manual-2.4.37-11.module+el8.0.0+2969+90015743.noarch.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4"
},
"product_reference": "httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4"
},
"product_reference": "httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4"
},
"product_reference": "httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4"
},
"product_reference": "httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4"
},
"product_reference": "httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4"
},
"product_reference": "httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4"
},
"product_reference": "httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4"
},
"product_reference": "httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4"
},
"product_reference": "mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4"
},
"product_reference": "mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4"
},
"product_reference": "mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.src.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.src.rpm-httpd:2.4"
},
"product_reference": "mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.src.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4"
},
"product_reference": "mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4"
},
"product_reference": "mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4"
},
"product_reference": "mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4"
},
"product_reference": "mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4"
},
"product_reference": "mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4"
},
"product_reference": "mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4"
},
"product_reference": "mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4"
},
"product_reference": "mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4"
},
"product_reference": "mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4"
},
"product_reference": "mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4"
},
"product_reference": "mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4"
},
"product_reference": "mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4"
},
"product_reference": "mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4"
},
"product_reference": "mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4"
},
"product_reference": "mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4"
},
"product_reference": "mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4"
},
"product_reference": "mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4"
},
"product_reference": "mod_md-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4"
},
"product_reference": "mod_md-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4"
},
"product_reference": "mod_md-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4"
},
"product_reference": "mod_md-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4"
},
"product_reference": "mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4"
},
"product_reference": "mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4"
},
"product_reference": "mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4"
},
"product_reference": "mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4"
},
"product_reference": "mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4"
},
"product_reference": "mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4"
},
"product_reference": "mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4"
},
"product_reference": "mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4"
},
"product_reference": "mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4"
},
"product_reference": "mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4"
},
"product_reference": "mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4"
},
"product_reference": "mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4"
},
"product_reference": "mod_session-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4"
},
"product_reference": "mod_session-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4"
},
"product_reference": "mod_session-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4"
},
"product_reference": "mod_session-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4"
},
"product_reference": "mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4"
},
"product_reference": "mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4"
},
"product_reference": "mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4"
},
"product_reference": "mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4"
},
"product_reference": "mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4"
},
"product_reference": "mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4"
},
"product_reference": "mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4"
},
"product_reference": "mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4"
},
"product_reference": "mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4"
},
"product_reference": "mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4"
},
"product_reference": "mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm (httpd:2.4) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4"
},
"product_reference": "mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"relates_to_product_reference": "AppStream-8.0.0.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-0211",
"cwe": {
"id": "CWE-250",
"name": "Execution with Unnecessary Privileges"
},
"discovery_date": "2019-04-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1694980"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache where code executing in a less-privileged child process or thread could execute arbitrary code with the privilege of the parent process (usually root). An attacker having access to run arbitrary scripts on the web server (PHP, CGI etc) could use this flaw to run code on the web server with root privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: privilege escalation from modules scripts",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is exploitable in httpd if it is configured to allow an untrusted user to upload and execute arbitrary scripts. Due to the nature of the flaw, the uploaded script would not run as a restricted privileged user, but rather it runs as root allowing for privilege escalation from the restricted user to root on the web server. \n\nDepending on the configuration of the server, you would need local (AV:L) privileges to place the script or network (AV:N) privileges if the server ran an application that permitted uploading scripts directly. The latter scenario is not common for unauthenticated users. Once the attacker can place the script somewhere in the web root where it can be easily exploited (AC:L). This type of setup is more common in shared hosted environments (PR:L) and would allow an attacker with access to a site on the shared hosted to impact the confidentiality, integrity, and availability (CIA:H) with no interaction (UI:N). Due to the elevated privileges obtained, there is an impact to the system beyond the web server itself (S:C).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.src.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-filesystem-2.4.37-11.module+el8.0.0+2969+90015743.noarch.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-manual-2.4.37-11.module+el8.0.0+2969+90015743.noarch.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.src.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0211"
},
{
"category": "external",
"summary": "RHBZ#1694980",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1694980"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0211",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0211"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0211",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0211"
},
{
"category": "external",
"summary": "http://www.apache.org/dist/httpd/CHANGES_2.4",
"url": "http://www.apache.org/dist/httpd/CHANGES_2.4"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2019-04-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-05-07T04:19:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
"product_ids": [
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.src.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-filesystem-2.4.37-11.module+el8.0.0+2969+90015743.noarch.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-manual-2.4.37-11.module+el8.0.0+2969+90015743.noarch.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.src.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:0980"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.src.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-filesystem-2.4.37-11.module+el8.0.0+2969+90015743.noarch.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-manual-2.4.37-11.module+el8.0.0+2969+90015743.noarch.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.src.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2021-11-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "httpd: privilege escalation from modules scripts"
},
{
"cve": "CVE-2019-0215",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2019-04-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1695025"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache HTTP Server 2.4 (releases 2.4.37 and 2.4.38). A bug in mod_ssl, when using per-location client certificate verification with TLSv1.3, allowed a client supporting Post-Handshake Authentication to bypass configured access control restrictions. An attacker could perform various unauthorized actions after bypassing the restrictions. The highest threat from this vulnerability is to data confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: mod_ssl: access control bypass when using per-location client certification authentication",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw can be exploited for httpd configurations where per-location client certificates are enabled and TLS 1.3 is used. \n\nThe attacker can remotely exploit this httpd flaw (AV:N). However the server had to be configured to use per-location client certificate and the attacker needs to have access to the authenticating client certificate (AC:H). No other significant privileges are required by the attacker (PR:L). The result of the attack is bypass of the configured access control restrictions (CI:H). This however does not affect the system beyond the web server itself (S:U).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.src.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-filesystem-2.4.37-11.module+el8.0.0+2969+90015743.noarch.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-manual-2.4.37-11.module+el8.0.0+2969+90015743.noarch.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.src.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0215"
},
{
"category": "external",
"summary": "RHBZ#1695025",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695025"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0215"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0215",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0215"
},
{
"category": "external",
"summary": "http://www.apache.org/dist/httpd/CHANGES_2.4",
"url": "http://www.apache.org/dist/httpd/CHANGES_2.4"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2019-04-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-05-07T04:19:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
"product_ids": [
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.src.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-filesystem-2.4.37-11.module+el8.0.0+2969+90015743.noarch.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-manual-2.4.37-11.module+el8.0.0+2969+90015743.noarch.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.src.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:0980"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.src.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-debugsource-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-filesystem-2.4.37-11.module+el8.0.0+2969+90015743.noarch.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-manual-2.4.37-11.module+el8.0.0+2969+90015743.noarch.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:httpd-tools-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.src.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debuginfo-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_http2-debugsource-1.11.3-2.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ldap-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_md-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_proxy_html-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_session-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.aarch64.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.ppc64le.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.s390x.rpm-httpd:2.4",
"AppStream-8.0.0.Z:mod_ssl-debuginfo-2.4.37-11.module+el8.0.0+2969+90015743.x86_64.rpm-httpd:2.4"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "httpd: mod_ssl: access control bypass when using per-location client certification authentication"
}
]
}
gsd-2019-0215
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
In Apache HTTP Server 2.4 releases 2.4.37 and 2.4.38, a bug in mod_ssl when using per-location client certificate verification with TLSv1.3 allowed a client to bypass configured access control restrictions.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2019-0215",
"description": "In Apache HTTP Server 2.4 releases 2.4.37 and 2.4.38, a bug in mod_ssl when using per-location client certificate verification with TLSv1.3 allowed a client to bypass configured access control restrictions.",
"id": "GSD-2019-0215",
"references": [
"https://www.suse.com/security/cve/CVE-2019-0215.html",
"https://access.redhat.com/errata/RHSA-2019:0980",
"https://security.archlinux.org/CVE-2019-0215",
"https://alas.aws.amazon.com/cve/html/CVE-2019-0215.html",
"https://linux.oracle.com/cve/CVE-2019-0215.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2019-0215"
],
"details": "In Apache HTTP Server 2.4 releases 2.4.37 and 2.4.38, a bug in mod_ssl when using per-location client certificate verification with TLSv1.3 allowed a client to bypass configured access control restrictions.",
"id": "GSD-2019-0215",
"modified": "2023-12-13T01:23:39.701717Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security@apache.org",
"ID": "CVE-2019-0215",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Apache HTTP Server",
"version": {
"version_data": [
{
"version_value": "2.4.37"
},
{
"version_value": "2.4.38"
}
]
}
}
]
},
"vendor_name": "Apache"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In Apache HTTP Server 2.4 releases 2.4.37 and 2.4.38, a bug in mod_ssl when using per-location client certificate verification with TLSv1.3 allowed a client to bypass configured access control restrictions."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Access Control Bypass"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20190401 CVE-2019-0215: mod_ssl access control bypass",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2019/04/02/4"
},
{
"name": "[httpd-cvs] 20190402 svn commit: r1856807 - /httpd/test/framework/trunk/t/security/CVE-2019-0215.t",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/2d6bd429a0ba9af1580da896575cfca6e42bb05e7536562d4b095fcf@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "107667",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/107667"
},
{
"name": "FEDORA-2019-cf7695b470",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/"
},
{
"name": "FEDORA-2019-119b14075a",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/"
},
{
"name": "https://httpd.apache.org/security/vulnerabilities_24.html",
"refsource": "MISC",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
},
{
"name": "https://support.f5.com/csp/article/K59440504",
"refsource": "CONFIRM",
"url": "https://support.f5.com/csp/article/K59440504"
},
{
"name": "https://security.netapp.com/advisory/ntap-20190423-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20190423-0001/"
},
{
"name": "RHSA-2019:0980",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:0980"
},
{
"name": "FEDORA-2019-a4ed7400f4",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/"
},
{
"name": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
"refsource": "MISC",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"
},
{
"name": "[httpd-dev] 20190804 Re: svn commit: r1856807 - /httpd/test/framework/trunk/t/security/CVE-2019-0215.t",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/117bc3f09847ebf020b1bb70301ebcc105ddc446856150b63f37f8eb@%3Cdev.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20190806 svn commit: r1864463 - /httpd/test/framework/trunk/t/security/CVE-2019-0215.t",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/bc1a6d4137798565ab02e60079b6788442147f4efeb4200c665bed5b@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-dev] 20190806 Re: svn commit: r1856807 - /httpd/test/framework/trunk/t/security/CVE-2019-0215.t",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/5b1e7d66c5adf286f14f6cc0f857b6fca107444f68aed9e70eedab47@%3Cdev.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
"refsource": "MISC",
"url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
},
{
"name": "https://www.oracle.com/security-alerts/cpujan2020.html",
"refsource": "MISC",
"url": "https://www.oracle.com/security-alerts/cpujan2020.html"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "https://www.oracle.com/security-alerts/cpuapr2020.html",
"refsource": "MISC",
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073149 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.4.37:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.4.38:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security@apache.org",
"ID": "CVE-2019-0215"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "In Apache HTTP Server 2.4 releases 2.4.37 and 2.4.38, a bug in mod_ssl when using per-location client certificate verification with TLSv1.3 allowed a client to bypass configured access control restrictions."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "FEDORA-2019-cf7695b470",
"refsource": "FEDORA",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/"
},
{
"name": "FEDORA-2019-119b14075a",
"refsource": "FEDORA",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/"
},
{
"name": "[httpd-cvs] 20190402 svn commit: r1856807 - /httpd/test/framework/trunk/t/security/CVE-2019-0215.t",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Exploit",
"Vendor Advisory"
],
"url": "https://lists.apache.org/thread.html/2d6bd429a0ba9af1580da896575cfca6e42bb05e7536562d4b095fcf@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "https://httpd.apache.org/security/vulnerabilities_24.html",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
},
{
"name": "107667",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/107667"
},
{
"name": "[oss-security] 20190401 CVE-2019-0215: mod_ssl access control bypass",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Mitigation",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2019/04/02/4"
},
{
"name": "https://support.f5.com/csp/article/K59440504",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://support.f5.com/csp/article/K59440504"
},
{
"name": "https://security.netapp.com/advisory/ntap-20190423-0001/",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20190423-0001/"
},
{
"name": "RHSA-2019:0980",
"refsource": "REDHAT",
"tags": [],
"url": "https://access.redhat.com/errata/RHSA-2019:0980"
},
{
"name": "FEDORA-2019-a4ed7400f4",
"refsource": "FEDORA",
"tags": [],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/"
},
{
"name": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
"refsource": "MISC",
"tags": [],
"url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"
},
{
"name": "[httpd-dev] 20190804 Re: svn commit: r1856807 - /httpd/test/framework/trunk/t/security/CVE-2019-0215.t",
"refsource": "MLIST",
"tags": [],
"url": "https://lists.apache.org/thread.html/117bc3f09847ebf020b1bb70301ebcc105ddc446856150b63f37f8eb@%3Cdev.httpd.apache.org%3E"
},
{
"name": "[httpd-dev] 20190806 Re: svn commit: r1856807 - /httpd/test/framework/trunk/t/security/CVE-2019-0215.t",
"refsource": "MLIST",
"tags": [],
"url": "https://lists.apache.org/thread.html/5b1e7d66c5adf286f14f6cc0f857b6fca107444f68aed9e70eedab47@%3Cdev.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20190806 svn commit: r1864463 - /httpd/test/framework/trunk/t/security/CVE-2019-0215.t",
"refsource": "MLIST",
"tags": [],
"url": "https://lists.apache.org/thread.html/bc1a6d4137798565ab02e60079b6788442147f4efeb4200c665bed5b@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"tags": [],
"url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"tags": [],
"url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
"refsource": "MISC",
"tags": [],
"url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
},
{
"name": "https://www.oracle.com/security-alerts/cpujan2020.html",
"refsource": "MISC",
"tags": [],
"url": "https://www.oracle.com/security-alerts/cpujan2020.html"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"tags": [],
"url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"tags": [],
"url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "N/A",
"refsource": "N/A",
"tags": [],
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
"refsource": "MLIST",
"tags": [],
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"tags": [],
"url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
"refsource": "MLIST",
"tags": [],
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/",
"refsource": "MLIST",
"tags": [],
"url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/",
"refsource": "MLIST",
"tags": [],
"url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
"refsource": "MLIST",
"tags": [],
"url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073149 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
"refsource": "MLIST",
"tags": [],
"url": "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"tags": [],
"url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
},
"lastModifiedDate": "2021-06-06T11:15Z",
"publishedDate": "2019-04-08T20:29Z"
}
}
}
wid-sec-w-2023-2047
Vulnerability from csaf_certbund
Published
2019-04-02 22:00
Modified
2023-08-13 22:00
Summary
Apache HTTP Server: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Apache ist ein Webserver für verschiedene Plattformen.
Angriff
Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen im Apache HTTP Server ausnutzen, um seine Rechte zu erweitern, Sicherheitsrestriktionen zu umgehen oder um einen Denial of Service Angriff durchzuführen.
Betroffene Betriebssysteme
- UNIX
- Linux
- Windows
- NetApp Appliance
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Apache ist ein Webserver f\u00fcr verschiedene Plattformen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen im Apache HTTP Server ausnutzen, um seine Rechte zu erweitern, Sicherheitsrestriktionen zu umgehen oder um einen Denial of Service Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- UNIX\n- Linux\n- Windows\n- NetApp Appliance",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-2047 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2019/wid-sec-w-2023-2047.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-2047 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2047"
},
{
"category": "external",
"summary": "HPE Securi+y Bulletin",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-hpesbst04494en_us"
},
{
"category": "external",
"summary": "Eintr\u00e4ge in der OSS Mailing Liste vom 2019-04-02",
"url": "https://seclists.org/oss-sec/2019/q2/0"
},
{
"category": "external",
"summary": "Eintr\u00e4ge in der OSS Mailing Liste vom 2019-04-02",
"url": "https://seclists.org/oss-sec/2019/q2/1"
},
{
"category": "external",
"summary": "Eintr\u00e4ge in der OSS Mailing Liste vom 2019-04-02",
"url": "https://seclists.org/oss-sec/2019/q2/2"
},
{
"category": "external",
"summary": "Eintr\u00e4ge in der OSS Mailing Liste vom 2019-04-02",
"url": "https://seclists.org/oss-sec/2019/q2/3"
},
{
"category": "external",
"summary": "Eintr\u00e4ge in der OSS Mailing Liste vom 2019-04-02",
"url": "https://seclists.org/oss-sec/2019/q2/4"
},
{
"category": "external",
"summary": "Eintr\u00e4ge in der OSS Mailing Liste vom 2019-04-02",
"url": "https://seclists.org/oss-sec/2019/q2/5"
},
{
"category": "external",
"summary": "Apache Release Notes Stand 2019-04-02",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-4422 vom 2019-04-04 vom 2019-04-03",
"url": "https://lists.debian.org/debian-security-announce/2019/msg00066.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notices USN-3937-1 vom 2019-04-04",
"url": "https://usn.ubuntu.com/3937-1/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:0878-1 vom 2019-04-04",
"url": "https://www.suse.com/de-de/support/update/announcement/2019/suse-su-20190878-1/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:0873-1 vom 2019-04-04",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2019-April/005295.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:0889-1 vom 2019-04-05",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190889-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:0888-1 vom 2019-04-05",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190888-1.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-3937-2 vom 2019-04-10",
"url": "https://usn.ubuntu.com/3937-2/"
},
{
"category": "external",
"summary": "Arch Linux Security Advisory ASA-201904-3 vom 2019-04-05",
"url": "https://security.archlinux.org/ASA-201904-3"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:0746 vom 2019-04-11",
"url": "https://access.redhat.com/errata/RHSA-2019:0746"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:0888-2 vom 2019-04-12",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190888-2.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0251 vom 2020-01-27",
"url": "https://access.redhat.com/errata/RHSA-2020:0251"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0250 vom 2020-01-27",
"url": "https://access.redhat.com/errata/RHSA-2020:0250"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:0980 vom 2019-05-07",
"url": "https://access.redhat.com/errata/RHSA-2019:0980"
},
{
"category": "external",
"summary": "Exploit f\u00fcr CVE-2019-0211 vom 2019-05-16",
"url": "https://github.com/cfreal/exploits/tree/master/CVE-2019-0211-apache"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:1296 vom 2019-05-30",
"url": "https://access.redhat.com/errata/RHSA-2019:1296"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:1297 vom 2019-05-30",
"url": "https://access.redhat.com/errata/RHSA-2019:1297"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20190423-0001 vom 2019-06-06",
"url": "https://security.netapp.com/advisory/ntap-20190423-0001/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:1543 vom 2019-06-19",
"url": "https://access.redhat.com/errata/RHSA-2019:1543"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20190625-0007 vom 2019-06-25",
"url": "https://security.netapp.com/advisory/ntap-20190625-0007/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2343 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2343"
},
{
"category": "external",
"summary": "HP SECURITY BULLETIN hpesbux03950en_us vom 2019-08-22",
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=hpesbux03950en_us"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4113-1 vom 2019-08-30",
"url": "https://usn.ubuntu.com/4113-1/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4113-2 vom 2019-09-17",
"url": "https://usn.ubuntu.com/4113-2/"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2019:2343 vom 2019-09-18",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-2343-Moderate-CentOS-7-httpd-Security-Update-tp4645680.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3436 vom 2019-11-05",
"url": "https://access.redhat.com/errata/RHSA-2019:3436"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3933 vom 2019-11-20",
"url": "https://access.redhat.com/errata/RHSA-2019:3933"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3935 vom 2019-11-20",
"url": "https://access.redhat.com/errata/RHSA-2019:3935"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3932 vom 2019-11-20",
"url": "https://access.redhat.com/errata/RHSA-2019:3932"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:4126 vom 2019-12-10",
"url": "https://access.redhat.com/errata/RHSA-2019:4126"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:2644 vom 2020-06-22",
"url": "https://access.redhat.com/errata/RHSA-2020:2644"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:2646 vom 2020-06-22",
"url": "https://access.redhat.com/errata/RHSA-2020:2646"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA11023 vom 2020-07-08",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11023"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:4751 vom 2020-11-04",
"url": "https://access.redhat.com/errata/RHSA-2020:4751"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2020-161 vom 2020-12-08",
"url": "https://downloads.avaya.com/css/P8/documents/101072834"
}
],
"source_lang": "en-US",
"title": "Apache HTTP Server: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2023-08-13T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:57:00.275+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-2047",
"initial_release_date": "2019-04-02T22:00:00.000+00:00",
"revision_history": [
{
"date": "2019-04-02T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2019-04-03T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Debian und Fedora aufgenommen"
},
{
"date": "2019-04-04T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2019-04-04T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-04-04T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-04-07T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-04-10T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Ubuntu und Arch Linux aufgenommen"
},
{
"date": "2019-04-11T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2019-04-14T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-04-22T22:00:00.000+00:00",
"number": "10",
"summary": "Referenz(en) aufgenommen: GLSA/201904-20"
},
{
"date": "2019-05-06T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2019-05-16T22:00:00.000+00:00",
"number": "12",
"summary": "Exploit aufgenommen"
},
{
"date": "2019-05-23T22:00:00.000+00:00",
"number": "13",
"summary": "Referenz(en) aufgenommen: FEDORA-2019-B99E48E883, FEDORA-2019-08E57D15FD"
},
{
"date": "2019-05-30T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2019-05-30T22:00:00.000+00:00",
"number": "15",
"summary": "Referenz(en) aufgenommen: FEDORA-2019-C7187E6DC7"
},
{
"date": "2019-06-02T22:00:00.000+00:00",
"number": "16",
"summary": "Schreibfehler korrigiert"
},
{
"date": "2019-06-06T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von NetApp aufgenommen"
},
{
"date": "2019-06-18T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2019-06-24T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von NetApp aufgenommen"
},
{
"date": "2019-08-06T22:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2019-08-25T22:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von HP aufgenommen"
},
{
"date": "2019-08-29T22:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2019-09-17T22:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2019-09-18T22:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von CentOS aufgenommen"
},
{
"date": "2019-11-05T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2019-11-20T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2019-12-09T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-01-27T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-06-22T22:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-07-08T22:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von Juniper aufgenommen"
},
{
"date": "2020-11-03T23:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-12-09T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von AVAYA aufgenommen"
},
{
"date": "2023-08-13T22:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von HP aufgenommen"
}
],
"status": "final",
"version": "33"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Apache HTTP Server \u003c 2.4.39",
"product": {
"name": "Apache HTTP Server \u003c 2.4.39",
"product_id": "T013862",
"product_identification_helper": {
"cpe": "cpe:/a:apache:http_server:2.4.39"
}
}
}
],
"category": "vendor",
"name": "Apache"
},
{
"branches": [
{
"category": "product_name",
"name": "Avaya Aura Experience Portal",
"product": {
"name": "Avaya Aura Experience Portal",
"product_id": "T015519",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:aura_experience_portal:-"
}
}
}
],
"category": "vendor",
"name": "Avaya"
},
{
"branches": [
{
"category": "product_name",
"name": "Broadcom Brocade Switch",
"product": {
"name": "Broadcom Brocade Switch",
"product_id": "T015844",
"product_identification_helper": {
"cpe": "cpe:/h:brocade:switch:-"
}
}
}
],
"category": "vendor",
"name": "Broadcom"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "HPE HP-UX",
"product": {
"name": "HPE HP-UX",
"product_id": "4871",
"product_identification_helper": {
"cpe": "cpe:/o:hp:hp-ux:-"
}
}
},
{
"category": "product_name",
"name": "HPE Switch",
"product": {
"name": "HPE Switch",
"product_id": "T005119",
"product_identification_helper": {
"cpe": "cpe:/h:hp:switch:-"
}
}
}
],
"category": "vendor",
"name": "HPE"
},
{
"branches": [
{
"category": "product_name",
"name": "Juniper Junos Space \u003c 20.1R1",
"product": {
"name": "Juniper Junos Space \u003c 20.1R1",
"product_id": "T016874",
"product_identification_helper": {
"cpe": "cpe:/a:juniper:junos_space:20.1r1"
}
}
}
],
"category": "vendor",
"name": "Juniper"
},
{
"branches": [
{
"category": "product_name",
"name": "NetApp Data ONTAP",
"product": {
"name": "NetApp Data ONTAP",
"product_id": "7654",
"product_identification_helper": {
"cpe": "cpe:/a:netapp:data_ontap:-"
}
}
}
],
"category": "vendor",
"name": "NetApp"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Arch Linux",
"product": {
"name": "Open Source Arch Linux",
"product_id": "T013312",
"product_identification_helper": {
"cpe": "cpe:/o:archlinux:archlinux:-"
}
}
},
{
"category": "product_name",
"name": "Open Source CentOS",
"product": {
"name": "Open Source CentOS",
"product_id": "1727",
"product_identification_helper": {
"cpe": "cpe:/o:centos:centos:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-0196",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle im Apache HTTP Server. In mod_http2 besteht ein read-after-free Fehler in einem String Vergleich. Ein entfernter anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service zu verursachen."
}
],
"product_status": {
"known_affected": [
"T015519",
"2951",
"T002207",
"67646",
"4871",
"T000126",
"7654",
"T015844",
"T013312",
"T005119",
"1727"
]
},
"release_date": "2019-04-02T22:00:00.000+00:00",
"title": "CVE-2019-0196"
},
{
"cve": "CVE-2019-0197",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle im Apache HTTP Server. Diese besteht aufgrund unsachgem\u00e4\u00df behandelter Upgrade request from http/1.1 auf http/2 in mod_http2. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service zu verursachen."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T015844",
"T013312",
"T005119",
"1727"
]
},
"release_date": "2019-04-02T22:00:00.000+00:00",
"title": "CVE-2019-0197"
},
{
"cve": "CVE-2019-0211",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle im Apache HTTP Server. Unter bestimmten Umst\u00e4nden kann Code, der in weniger privilegierten Kindprozessen oder Threads ausgef\u00fchrt wird, beliebigen Code mit den Privilegien des \u00fcbergeordneten Prozesses ausf\u00fchren. Ein lokaler Angreifer kann diese Schwachstelle durch Manipulation des Scoreboards ausnutzen, um seine Rechte zu erweitern."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T015844",
"T013312",
"T005119",
"1727"
]
},
"release_date": "2019-04-02T22:00:00.000+00:00",
"title": "CVE-2019-0211"
},
{
"cve": "CVE-2019-0215",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle im Apache HTTP Server. Diese besteht aufgrund eines Fehlers in mod_ssl bei der Verifizierung von Client-Zertifikaten. Ein authentisierter Angreifer kann diese Schwachstelle ausnutzen, um Zugriffsbeschr\u00e4nkungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"2951",
"67646",
"T015844",
"T013312",
"T005119",
"1727"
]
},
"release_date": "2019-04-02T22:00:00.000+00:00",
"title": "CVE-2019-0215"
},
{
"cve": "CVE-2019-0217",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle im Apache HTTP Server. Es besteht eine Race Condition in mod_auth_digest w\u00e4hrend der Ausf\u00fchrung in einem Thread-Server. Ein authentisierter Angreifer kann kann diese Schwachstelle ausnutzen, um konfigurierte Zugriffsbeschr\u00e4nkungen zu umgehen und sich mit einem anderen Benutzernamen zu authentifizieren."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T015844",
"T013312",
"T005119",
"1727"
]
},
"release_date": "2019-04-02T22:00:00.000+00:00",
"title": "CVE-2019-0217"
},
{
"cve": "CVE-2019-0220",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle im Apache HTTP Server. Diese besteht wegen einer unsachgem\u00e4\u00dfen Behandlung von regul\u00e4ren Ausdr\u00fccken in der Pfadkomponente einer Request-URL. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service zu verursachen."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"7654",
"T015844",
"T013312",
"T005119",
"1727"
]
},
"release_date": "2019-04-02T22:00:00.000+00:00",
"title": "CVE-2019-0220"
}
]
}
WID-SEC-W-2023-2047
Vulnerability from csaf_certbund
Published
2019-04-02 22:00
Modified
2023-08-13 22:00
Summary
Apache HTTP Server: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Apache ist ein Webserver für verschiedene Plattformen.
Angriff
Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen im Apache HTTP Server ausnutzen, um seine Rechte zu erweitern, Sicherheitsrestriktionen zu umgehen oder um einen Denial of Service Angriff durchzuführen.
Betroffene Betriebssysteme
- UNIX
- Linux
- Windows
- NetApp Appliance
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Apache ist ein Webserver f\u00fcr verschiedene Plattformen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen im Apache HTTP Server ausnutzen, um seine Rechte zu erweitern, Sicherheitsrestriktionen zu umgehen oder um einen Denial of Service Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- UNIX\n- Linux\n- Windows\n- NetApp Appliance",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-2047 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2019/wid-sec-w-2023-2047.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-2047 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2047"
},
{
"category": "external",
"summary": "HPE Securi+y Bulletin",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-hpesbst04494en_us"
},
{
"category": "external",
"summary": "Eintr\u00e4ge in der OSS Mailing Liste vom 2019-04-02",
"url": "https://seclists.org/oss-sec/2019/q2/0"
},
{
"category": "external",
"summary": "Eintr\u00e4ge in der OSS Mailing Liste vom 2019-04-02",
"url": "https://seclists.org/oss-sec/2019/q2/1"
},
{
"category": "external",
"summary": "Eintr\u00e4ge in der OSS Mailing Liste vom 2019-04-02",
"url": "https://seclists.org/oss-sec/2019/q2/2"
},
{
"category": "external",
"summary": "Eintr\u00e4ge in der OSS Mailing Liste vom 2019-04-02",
"url": "https://seclists.org/oss-sec/2019/q2/3"
},
{
"category": "external",
"summary": "Eintr\u00e4ge in der OSS Mailing Liste vom 2019-04-02",
"url": "https://seclists.org/oss-sec/2019/q2/4"
},
{
"category": "external",
"summary": "Eintr\u00e4ge in der OSS Mailing Liste vom 2019-04-02",
"url": "https://seclists.org/oss-sec/2019/q2/5"
},
{
"category": "external",
"summary": "Apache Release Notes Stand 2019-04-02",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-4422 vom 2019-04-04 vom 2019-04-03",
"url": "https://lists.debian.org/debian-security-announce/2019/msg00066.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notices USN-3937-1 vom 2019-04-04",
"url": "https://usn.ubuntu.com/3937-1/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:0878-1 vom 2019-04-04",
"url": "https://www.suse.com/de-de/support/update/announcement/2019/suse-su-20190878-1/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:0873-1 vom 2019-04-04",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2019-April/005295.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:0889-1 vom 2019-04-05",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190889-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:0888-1 vom 2019-04-05",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190888-1.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-3937-2 vom 2019-04-10",
"url": "https://usn.ubuntu.com/3937-2/"
},
{
"category": "external",
"summary": "Arch Linux Security Advisory ASA-201904-3 vom 2019-04-05",
"url": "https://security.archlinux.org/ASA-201904-3"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:0746 vom 2019-04-11",
"url": "https://access.redhat.com/errata/RHSA-2019:0746"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:0888-2 vom 2019-04-12",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190888-2.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0251 vom 2020-01-27",
"url": "https://access.redhat.com/errata/RHSA-2020:0251"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0250 vom 2020-01-27",
"url": "https://access.redhat.com/errata/RHSA-2020:0250"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:0980 vom 2019-05-07",
"url": "https://access.redhat.com/errata/RHSA-2019:0980"
},
{
"category": "external",
"summary": "Exploit f\u00fcr CVE-2019-0211 vom 2019-05-16",
"url": "https://github.com/cfreal/exploits/tree/master/CVE-2019-0211-apache"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:1296 vom 2019-05-30",
"url": "https://access.redhat.com/errata/RHSA-2019:1296"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:1297 vom 2019-05-30",
"url": "https://access.redhat.com/errata/RHSA-2019:1297"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20190423-0001 vom 2019-06-06",
"url": "https://security.netapp.com/advisory/ntap-20190423-0001/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:1543 vom 2019-06-19",
"url": "https://access.redhat.com/errata/RHSA-2019:1543"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20190625-0007 vom 2019-06-25",
"url": "https://security.netapp.com/advisory/ntap-20190625-0007/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2343 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2343"
},
{
"category": "external",
"summary": "HP SECURITY BULLETIN hpesbux03950en_us vom 2019-08-22",
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=hpesbux03950en_us"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4113-1 vom 2019-08-30",
"url": "https://usn.ubuntu.com/4113-1/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4113-2 vom 2019-09-17",
"url": "https://usn.ubuntu.com/4113-2/"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2019:2343 vom 2019-09-18",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-2343-Moderate-CentOS-7-httpd-Security-Update-tp4645680.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3436 vom 2019-11-05",
"url": "https://access.redhat.com/errata/RHSA-2019:3436"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3933 vom 2019-11-20",
"url": "https://access.redhat.com/errata/RHSA-2019:3933"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3935 vom 2019-11-20",
"url": "https://access.redhat.com/errata/RHSA-2019:3935"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3932 vom 2019-11-20",
"url": "https://access.redhat.com/errata/RHSA-2019:3932"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:4126 vom 2019-12-10",
"url": "https://access.redhat.com/errata/RHSA-2019:4126"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:2644 vom 2020-06-22",
"url": "https://access.redhat.com/errata/RHSA-2020:2644"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:2646 vom 2020-06-22",
"url": "https://access.redhat.com/errata/RHSA-2020:2646"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA11023 vom 2020-07-08",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11023"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:4751 vom 2020-11-04",
"url": "https://access.redhat.com/errata/RHSA-2020:4751"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2020-161 vom 2020-12-08",
"url": "https://downloads.avaya.com/css/P8/documents/101072834"
}
],
"source_lang": "en-US",
"title": "Apache HTTP Server: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2023-08-13T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:57:00.275+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-2047",
"initial_release_date": "2019-04-02T22:00:00.000+00:00",
"revision_history": [
{
"date": "2019-04-02T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2019-04-03T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Debian und Fedora aufgenommen"
},
{
"date": "2019-04-04T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2019-04-04T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-04-04T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-04-07T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-04-10T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Ubuntu und Arch Linux aufgenommen"
},
{
"date": "2019-04-11T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2019-04-14T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-04-22T22:00:00.000+00:00",
"number": "10",
"summary": "Referenz(en) aufgenommen: GLSA/201904-20"
},
{
"date": "2019-05-06T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2019-05-16T22:00:00.000+00:00",
"number": "12",
"summary": "Exploit aufgenommen"
},
{
"date": "2019-05-23T22:00:00.000+00:00",
"number": "13",
"summary": "Referenz(en) aufgenommen: FEDORA-2019-B99E48E883, FEDORA-2019-08E57D15FD"
},
{
"date": "2019-05-30T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2019-05-30T22:00:00.000+00:00",
"number": "15",
"summary": "Referenz(en) aufgenommen: FEDORA-2019-C7187E6DC7"
},
{
"date": "2019-06-02T22:00:00.000+00:00",
"number": "16",
"summary": "Schreibfehler korrigiert"
},
{
"date": "2019-06-06T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von NetApp aufgenommen"
},
{
"date": "2019-06-18T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2019-06-24T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von NetApp aufgenommen"
},
{
"date": "2019-08-06T22:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2019-08-25T22:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von HP aufgenommen"
},
{
"date": "2019-08-29T22:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2019-09-17T22:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2019-09-18T22:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von CentOS aufgenommen"
},
{
"date": "2019-11-05T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2019-11-20T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2019-12-09T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-01-27T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-06-22T22:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-07-08T22:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von Juniper aufgenommen"
},
{
"date": "2020-11-03T23:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-12-09T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von AVAYA aufgenommen"
},
{
"date": "2023-08-13T22:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von HP aufgenommen"
}
],
"status": "final",
"version": "33"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Apache HTTP Server \u003c 2.4.39",
"product": {
"name": "Apache HTTP Server \u003c 2.4.39",
"product_id": "T013862",
"product_identification_helper": {
"cpe": "cpe:/a:apache:http_server:2.4.39"
}
}
}
],
"category": "vendor",
"name": "Apache"
},
{
"branches": [
{
"category": "product_name",
"name": "Avaya Aura Experience Portal",
"product": {
"name": "Avaya Aura Experience Portal",
"product_id": "T015519",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:aura_experience_portal:-"
}
}
}
],
"category": "vendor",
"name": "Avaya"
},
{
"branches": [
{
"category": "product_name",
"name": "Broadcom Brocade Switch",
"product": {
"name": "Broadcom Brocade Switch",
"product_id": "T015844",
"product_identification_helper": {
"cpe": "cpe:/h:brocade:switch:-"
}
}
}
],
"category": "vendor",
"name": "Broadcom"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "HPE HP-UX",
"product": {
"name": "HPE HP-UX",
"product_id": "4871",
"product_identification_helper": {
"cpe": "cpe:/o:hp:hp-ux:-"
}
}
},
{
"category": "product_name",
"name": "HPE Switch",
"product": {
"name": "HPE Switch",
"product_id": "T005119",
"product_identification_helper": {
"cpe": "cpe:/h:hp:switch:-"
}
}
}
],
"category": "vendor",
"name": "HPE"
},
{
"branches": [
{
"category": "product_name",
"name": "Juniper Junos Space \u003c 20.1R1",
"product": {
"name": "Juniper Junos Space \u003c 20.1R1",
"product_id": "T016874",
"product_identification_helper": {
"cpe": "cpe:/a:juniper:junos_space:20.1r1"
}
}
}
],
"category": "vendor",
"name": "Juniper"
},
{
"branches": [
{
"category": "product_name",
"name": "NetApp Data ONTAP",
"product": {
"name": "NetApp Data ONTAP",
"product_id": "7654",
"product_identification_helper": {
"cpe": "cpe:/a:netapp:data_ontap:-"
}
}
}
],
"category": "vendor",
"name": "NetApp"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Arch Linux",
"product": {
"name": "Open Source Arch Linux",
"product_id": "T013312",
"product_identification_helper": {
"cpe": "cpe:/o:archlinux:archlinux:-"
}
}
},
{
"category": "product_name",
"name": "Open Source CentOS",
"product": {
"name": "Open Source CentOS",
"product_id": "1727",
"product_identification_helper": {
"cpe": "cpe:/o:centos:centos:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-0196",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle im Apache HTTP Server. In mod_http2 besteht ein read-after-free Fehler in einem String Vergleich. Ein entfernter anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service zu verursachen."
}
],
"product_status": {
"known_affected": [
"T015519",
"2951",
"T002207",
"67646",
"4871",
"T000126",
"7654",
"T015844",
"T013312",
"T005119",
"1727"
]
},
"release_date": "2019-04-02T22:00:00.000+00:00",
"title": "CVE-2019-0196"
},
{
"cve": "CVE-2019-0197",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle im Apache HTTP Server. Diese besteht aufgrund unsachgem\u00e4\u00df behandelter Upgrade request from http/1.1 auf http/2 in mod_http2. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service zu verursachen."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T015844",
"T013312",
"T005119",
"1727"
]
},
"release_date": "2019-04-02T22:00:00.000+00:00",
"title": "CVE-2019-0197"
},
{
"cve": "CVE-2019-0211",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle im Apache HTTP Server. Unter bestimmten Umst\u00e4nden kann Code, der in weniger privilegierten Kindprozessen oder Threads ausgef\u00fchrt wird, beliebigen Code mit den Privilegien des \u00fcbergeordneten Prozesses ausf\u00fchren. Ein lokaler Angreifer kann diese Schwachstelle durch Manipulation des Scoreboards ausnutzen, um seine Rechte zu erweitern."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T015844",
"T013312",
"T005119",
"1727"
]
},
"release_date": "2019-04-02T22:00:00.000+00:00",
"title": "CVE-2019-0211"
},
{
"cve": "CVE-2019-0215",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle im Apache HTTP Server. Diese besteht aufgrund eines Fehlers in mod_ssl bei der Verifizierung von Client-Zertifikaten. Ein authentisierter Angreifer kann diese Schwachstelle ausnutzen, um Zugriffsbeschr\u00e4nkungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"2951",
"67646",
"T015844",
"T013312",
"T005119",
"1727"
]
},
"release_date": "2019-04-02T22:00:00.000+00:00",
"title": "CVE-2019-0215"
},
{
"cve": "CVE-2019-0217",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle im Apache HTTP Server. Es besteht eine Race Condition in mod_auth_digest w\u00e4hrend der Ausf\u00fchrung in einem Thread-Server. Ein authentisierter Angreifer kann kann diese Schwachstelle ausnutzen, um konfigurierte Zugriffsbeschr\u00e4nkungen zu umgehen und sich mit einem anderen Benutzernamen zu authentifizieren."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T015844",
"T013312",
"T005119",
"1727"
]
},
"release_date": "2019-04-02T22:00:00.000+00:00",
"title": "CVE-2019-0217"
},
{
"cve": "CVE-2019-0220",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle im Apache HTTP Server. Diese besteht wegen einer unsachgem\u00e4\u00dfen Behandlung von regul\u00e4ren Ausdr\u00fccken in der Pfadkomponente einer Request-URL. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service zu verursachen."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"7654",
"T015844",
"T013312",
"T005119",
"1727"
]
},
"release_date": "2019-04-02T22:00:00.000+00:00",
"title": "CVE-2019-0220"
}
]
}
cnvd-2019-08944
Vulnerability from cnvd
Title
Apache HTTP Server访问绕过漏洞
Description
Apache HTTP Server是美国阿帕奇(Apache)软件基金会的一款开源网页服务器。
Apache HTTP Server存在访问绕过漏洞。允许攻击者绕过某些安全限制并执行未经授权的操作。
Severity
高
VLAI Severity ?
Patch Name
Apache HTTP Server访问绕过漏洞的补丁
Patch Description
Apache HTTP Server是美国阿帕奇(Apache)软件基金会的一款开源网页服务器。
Apache HTTP Server存在访问绕过漏洞。允许攻击者绕过某些安全限制并执行未经授权的操作。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
用户可参考如下供应商提供的安全公告获得补丁信息: https://httpd.apache.org/security/vulnerabilities_24.html
Reference
https://httpd.apache.org/security/vulnerabilities_24.html
https://www.securityfocus.com/bid/107667
Impacted products
| Name | ['Apache HTTP Server 2.4.37', 'Apache HTTP Server 2.4.38'] |
|---|
{
"bids": {
"bid": {
"bidNumber": "107667"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2019-0215"
}
},
"description": "Apache HTTP Server\u662f\u7f8e\u56fd\u963f\u5e15\u5947\uff08Apache\uff09\u8f6f\u4ef6\u57fa\u91d1\u4f1a\u7684\u4e00\u6b3e\u5f00\u6e90\u7f51\u9875\u670d\u52a1\u5668\u3002\n\nApache HTTP Server\u5b58\u5728\u8bbf\u95ee\u7ed5\u8fc7\u6f0f\u6d1e\u3002\u5141\u8bb8\u653b\u51fb\u8005\u7ed5\u8fc7\u67d0\u4e9b\u5b89\u5168\u9650\u5236\u5e76\u6267\u884c\u672a\u7ecf\u6388\u6743\u7684\u64cd\u4f5c\u3002",
"discovererName": "Michael Kaufmann",
"formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u4f9b\u5e94\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u516c\u544a\u83b7\u5f97\u8865\u4e01\u4fe1\u606f\uff1a\r\nhttps://httpd.apache.org/security/vulnerabilities_24.html",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2019-08944",
"openTime": "2019-04-03",
"patchDescription": "Apache HTTP Server\u662f\u7f8e\u56fd\u963f\u5e15\u5947\uff08Apache\uff09\u8f6f\u4ef6\u57fa\u91d1\u4f1a\u7684\u4e00\u6b3e\u5f00\u6e90\u7f51\u9875\u670d\u52a1\u5668\u3002\r\n\r\nApache HTTP Server\u5b58\u5728\u8bbf\u95ee\u7ed5\u8fc7\u6f0f\u6d1e\u3002\u5141\u8bb8\u653b\u51fb\u8005\u7ed5\u8fc7\u67d0\u4e9b\u5b89\u5168\u9650\u5236\u5e76\u6267\u884c\u672a\u7ecf\u6388\u6743\u7684\u64cd\u4f5c\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Apache HTTP Server\u8bbf\u95ee\u7ed5\u8fc7\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"Apache HTTP Server 2.4.37",
"Apache HTTP Server 2.4.38"
]
},
"referenceLink": "https://httpd.apache.org/security/vulnerabilities_24.html\r\nhttps://www.securityfocus.com/bid/107667",
"serverity": "\u9ad8",
"submitTime": "2019-04-03",
"title": "Apache HTTP Server\u8bbf\u95ee\u7ed5\u8fc7\u6f0f\u6d1e"
}
CERTFR-2019-AVI-141
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Apache Httpd. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneReferences
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Apache Httpd versions ant\u00e9rieures \u00e0 2.4.39",
"product": {
"name": "N/A",
"vendor": {
"name": "Apache",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-0197",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0197"
},
{
"name": "CVE-2019-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0215"
},
{
"name": "CVE-2019-0196",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0196"
},
{
"name": "CVE-2019-0220",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0220"
},
{
"name": "CVE-2019-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0217"
},
{
"name": "CVE-2019-0211",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0211"
}
],
"initial_release_date": "2019-04-02T00:00:00",
"last_revision_date": "2019-04-02T00:00:00",
"links": [],
"reference": "CERTFR-2019-AVI-141",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-04-02T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Apache Httpd.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apache Httpd",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apache CHANGES_2.4 du 01 avril 2019",
"url": "http://www.apache.org/dist/httpd/CHANGES_2.4"
}
]
}
ghsa-xpmg-8256-c52g
Vulnerability from github
Published
2022-05-13 01:09
Modified
2022-05-13 01:09
Severity ?
VLAI Severity ?
Details
In Apache HTTP Server 2.4 releases 2.4.37 and 2.4.38, a bug in mod_ssl when using per-location client certificate verification with TLSv1.3 allowed a client to bypass configured access control restrictions.
{
"affected": [],
"aliases": [
"CVE-2019-0215"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2019-04-08T20:29:00Z",
"severity": "HIGH"
},
"details": "In Apache HTTP Server 2.4 releases 2.4.37 and 2.4.38, a bug in mod_ssl when using per-location client certificate verification with TLSv1.3 allowed a client to bypass configured access control restrictions.",
"id": "GHSA-xpmg-8256-c52g",
"modified": "2022-05-13T01:09:38Z",
"published": "2022-05-13T01:09:38Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0215"
},
{
"type": "WEB",
"url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
},
{
"type": "WEB",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"
},
{
"type": "WEB",
"url": "https://www.oracle.com/security-alerts/cpujan2020.html"
},
{
"type": "WEB",
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
},
{
"type": "WEB",
"url": "https://support.f5.com/csp/article/K59440504"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20190423-0001"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/bc1a6d4137798565ab02e60079b6788442147f4efeb4200c665bed5b@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/5b1e7d66c5adf286f14f6cc0f857b6fca107444f68aed9e70eedab47@%3Cdev.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/2d6bd429a0ba9af1580da896575cfca6e42bb05e7536562d4b095fcf@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/117bc3f09847ebf020b1bb70301ebcc105ddc446856150b63f37f8eb@%3Cdev.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2019:0980"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2019/04/02/4"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/107667"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
fkie_cve-2019-0215
Vulnerability from fkie_nvd
Published
2019-04-08 20:29
Modified
2024-11-21 04:16
Severity ?
Summary
In Apache HTTP Server 2.4 releases 2.4.37 and 2.4.38, a bug in mod_ssl when using per-location client certificate verification with TLSv1.3 allowed a client to bypass configured access control restrictions.
References
| URL | Tags | ||
|---|---|---|---|
| security@apache.org | http://www.openwall.com/lists/oss-security/2019/04/02/4 | Mailing List, Mitigation, Third Party Advisory | |
| security@apache.org | http://www.securityfocus.com/bid/107667 | Third Party Advisory, VDB Entry | |
| security@apache.org | https://access.redhat.com/errata/RHSA-2019:0980 | ||
| security@apache.org | https://httpd.apache.org/security/vulnerabilities_24.html | Vendor Advisory | |
| security@apache.org | https://lists.apache.org/thread.html/117bc3f09847ebf020b1bb70301ebcc105ddc446856150b63f37f8eb%40%3Cdev.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/2d6bd429a0ba9af1580da896575cfca6e42bb05e7536562d4b095fcf%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/5b1e7d66c5adf286f14f6cc0f857b6fca107444f68aed9e70eedab47%40%3Cdev.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/bc1a6d4137798565ab02e60079b6788442147f4efeb4200c665bed5b%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/ | ||
| security@apache.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/ | ||
| security@apache.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/ | ||
| security@apache.org | https://security.netapp.com/advisory/ntap-20190423-0001/ | Third Party Advisory | |
| security@apache.org | https://support.f5.com/csp/article/K59440504 | Third Party Advisory | |
| security@apache.org | https://www.oracle.com/security-alerts/cpuapr2020.html | ||
| security@apache.org | https://www.oracle.com/security-alerts/cpujan2020.html | ||
| security@apache.org | https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html | ||
| security@apache.org | https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2019/04/02/4 | Mailing List, Mitigation, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/107667 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:0980 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://httpd.apache.org/security/vulnerabilities_24.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/117bc3f09847ebf020b1bb70301ebcc105ddc446856150b63f37f8eb%40%3Cdev.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/2d6bd429a0ba9af1580da896575cfca6e42bb05e7536562d4b095fcf%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/5b1e7d66c5adf286f14f6cc0f857b6fca107444f68aed9e70eedab47%40%3Cdev.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/bc1a6d4137798565ab02e60079b6788442147f4efeb4200c665bed5b%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20190423-0001/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.f5.com/csp/article/K59440504 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpuapr2020.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpujan2020.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| apache | http_server | 2.4.37 | |
| apache | http_server | 2.4.38 | |
| fedoraproject | fedora | 29 | |
| fedoraproject | fedora | 30 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apache:http_server:2.4.37:*:*:*:*:*:*:*",
"matchCriteriaId": "DE5F8320-A680-4E2F-B32F-F7DBEED09ED6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.4.38:*:*:*:*:*:*:*",
"matchCriteriaId": "033F6E44-5230-4D11-883C-591D7FC21F36",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
"matchCriteriaId": "D100F7CE-FC64-4CC6-852A-6136D72DA419",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Apache HTTP Server 2.4 releases 2.4.37 and 2.4.38, a bug in mod_ssl when using per-location client certificate verification with TLSv1.3 allowed a client to bypass configured access control restrictions."
},
{
"lang": "es",
"value": "En Apache HTTP Server 2.4, versiones 2.4.37 y 2.4.38, un error en mod_ssl al utilizar la verificaci\u00f3n de certificados de cliente por ubicaci\u00f3n con TLSv1.3 permit\u00eda a un cliente eludir las restricciones de control de acceso configuradas."
}
],
"id": "CVE-2019-0215",
"lastModified": "2024-11-21T04:16:30.333",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-04-08T20:29:10.003",
"references": [
{
"source": "security@apache.org",
"tags": [
"Mailing List",
"Mitigation",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2019/04/02/4"
},
{
"source": "security@apache.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/107667"
},
{
"source": "security@apache.org",
"url": "https://access.redhat.com/errata/RHSA-2019:0980"
},
{
"source": "security@apache.org",
"tags": [
"Vendor Advisory"
],
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/117bc3f09847ebf020b1bb70301ebcc105ddc446856150b63f37f8eb%40%3Cdev.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/2d6bd429a0ba9af1580da896575cfca6e42bb05e7536562d4b095fcf%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/5b1e7d66c5adf286f14f6cc0f857b6fca107444f68aed9e70eedab47%40%3Cdev.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/bc1a6d4137798565ab02e60079b6788442147f4efeb4200c665bed5b%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/"
},
{
"source": "security@apache.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/"
},
{
"source": "security@apache.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/"
},
{
"source": "security@apache.org",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20190423-0001/"
},
{
"source": "security@apache.org",
"tags": [
"Third Party Advisory"
],
"url": "https://support.f5.com/csp/article/K59440504"
},
{
"source": "security@apache.org",
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
},
{
"source": "security@apache.org",
"url": "https://www.oracle.com/security-alerts/cpujan2020.html"
},
{
"source": "security@apache.org",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"
},
{
"source": "security@apache.org",
"url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Mitigation",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2019/04/02/4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/107667"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2019:0980"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/117bc3f09847ebf020b1bb70301ebcc105ddc446856150b63f37f8eb%40%3Cdev.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/2d6bd429a0ba9af1580da896575cfca6e42bb05e7536562d4b095fcf%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/5b1e7d66c5adf286f14f6cc0f857b6fca107444f68aed9e70eedab47%40%3Cdev.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/bc1a6d4137798565ab02e60079b6788442147f4efeb4200c665bed5b%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20190423-0001/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://support.f5.com/csp/article/K59440504"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.oracle.com/security-alerts/cpujan2020.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
}
],
"sourceIdentifier": "security@apache.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…