Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-22720 (GCVE-0-2022-22720)
Vulnerability from cvelistv5
Published
2022-03-14 10:15
Modified
2024-08-03 03:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-444 - Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')
Summary
Apache HTTP Server 2.4.52 and earlier fails to close inbound connection when errors are encountered discarding the request body, exposing the server to HTTP Request Smuggling
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache HTTP Server |
Version: Apache HTTP Server 2.4 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:21:48.980Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://httpd.apache.org/security/vulnerabilities_24.html" }, { "name": "[oss-security] 20220314 CVE-2022-22720: HTTP request smuggling vulnerability in Apache HTTP Server 2.4.52 and earlier", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/03/14/3" }, { "name": "FEDORA-2022-b4103753e9", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/" }, { "name": "[debian-lts-announce] 20220322 [SECURITY] [DLA 2960-1] apache2 security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html" }, { "name": "FEDORA-2022-21264ec6db", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/" }, { "name": "FEDORA-2022-78e3211c55", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20220321-0001/" }, { "name": "20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "name": "20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "name": "20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT213257" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT213256" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT213255" }, { "name": "GLSA-202208-20", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202208-20" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache HTTP Server", "vendor": "Apache Software Foundation", "versions": [ { "lessThanOrEqual": "2.4.52", "status": "affected", "version": "Apache HTTP Server 2.4", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "James Kettle \u003cjames.kettle portswigger.net\u003e" } ], "descriptions": [ { "lang": "en", "value": "Apache HTTP Server 2.4.52 and earlier fails to close inbound connection when errors are encountered discarding the request body, exposing the server to HTTP Request Smuggling" } ], "metrics": [ { "other": { "content": { "other": "important" }, "type": "unknown" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-444", "description": "CWE-444 Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request Smuggling\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-14T01:07:14", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://httpd.apache.org/security/vulnerabilities_24.html" }, { "name": "[oss-security] 20220314 CVE-2022-22720: HTTP request smuggling vulnerability in Apache HTTP Server 2.4.52 and earlier", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2022/03/14/3" }, { "name": "FEDORA-2022-b4103753e9", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/" }, { "name": "[debian-lts-announce] 20220322 [SECURITY] [DLA 2960-1] apache2 security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html" }, { "name": "FEDORA-2022-21264ec6db", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/" }, { "name": "FEDORA-2022-78e3211c55", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20220321-0001/" }, { "name": "20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "name": "20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "name": "20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT213257" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT213256" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT213255" }, { "name": "GLSA-202208-20", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202208-20" } ], "source": { "discovery": "UNKNOWN" }, "title": "HTTP request smuggling vulnerability in Apache HTTP Server 2.4.52 and earlier", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2022-22720", "STATE": "PUBLIC", "TITLE": "HTTP request smuggling vulnerability in Apache HTTP Server 2.4.52 and earlier" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache HTTP Server", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "Apache HTTP Server 2.4", "version_value": "2.4.52" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "credit": [ { "lang": "eng", "value": "James Kettle \u003cjames.kettle portswigger.net\u003e" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apache HTTP Server 2.4.52 and earlier fails to close inbound connection when errors are encountered discarding the request body, exposing the server to HTTP Request Smuggling" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": [ { "other": "important" } ], "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-444 Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request Smuggling\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://httpd.apache.org/security/vulnerabilities_24.html", "refsource": "MISC", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" }, { "name": "[oss-security] 20220314 CVE-2022-22720: HTTP request smuggling vulnerability in Apache HTTP Server 2.4.52 and earlier", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2022/03/14/3" }, { "name": "FEDORA-2022-b4103753e9", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/" }, { "name": "[debian-lts-announce] 20220322 [SECURITY] [DLA 2960-1] apache2 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html" }, { "name": "FEDORA-2022-21264ec6db", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/" }, { "name": "FEDORA-2022-78e3211c55", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/" }, { "name": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "name": "https://security.netapp.com/advisory/ntap-20220321-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20220321-0001/" }, { "name": "20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "name": "20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "name": "20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "name": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "name": "https://support.apple.com/kb/HT213257", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT213257" }, { "name": "https://support.apple.com/kb/HT213256", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT213256" }, { "name": "https://support.apple.com/kb/HT213255", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT213255" }, { "name": "GLSA-202208-20", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202208-20" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2022-22720", "datePublished": "2022-03-14T10:15:29", "dateReserved": "2022-01-06T00:00:00", "dateUpdated": "2024-08-03T03:21:48.980Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-22720\",\"sourceIdentifier\":\"security@apache.org\",\"published\":\"2022-03-14T11:15:09.083\",\"lastModified\":\"2024-11-21T06:47:18.963\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Apache HTTP Server 2.4.52 and earlier fails to close inbound connection when errors are encountered discarding the request body, exposing the server to HTTP Request Smuggling\"},{\"lang\":\"es\",\"value\":\"Apache HTTP Server versiones 2.4.52 y anteriores, no cierran la conexi\u00f3n entrante cuando son encontrados errores descartando el cuerpo de la petici\u00f3n, exponiendo al servidor al contrabando de peticiones HTTP\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"security@apache.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-444\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-444\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.4.52\",\"matchCriteriaId\":\"E4ABADEE-0A1F-4D0D-B32E-128DF9942FE5\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A930E247-0B43-43CB-98FF-6CE7B8189835\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B095CC03-7077-4A58-AB25-CC5380CDCE5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFC79B17-E9D2-44D5-93ED-2F959E7A3D43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD04BEE5-E9A8-4584-A68C-0195CE9C402C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3E503FB-6279-4D4A-91D8-E237ECF9D2B0\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1F4BF7F-90D4-4668-B4E6-B06F4070F448\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F441A43-1669-478D-9EC8-E96882DE4F9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*\",\"matchCriteriaId\":\"D425C653-37A2-448C-BF2F-B684ADB08A26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*\",\"matchCriteriaId\":\"A54D63B7-B92B-47C3-B1C5-9892E5873A98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*\",\"matchCriteriaId\":\"3456176F-9185-4EE2-A8CE-3D989D674AB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*\",\"matchCriteriaId\":\"D337EE21-2F00-484D-9285-F2B0248D7A19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*\",\"matchCriteriaId\":\"012052B5-9AA7-4FD3-9C80-5F615330039D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-007:*:*:*:*:*:*\",\"matchCriteriaId\":\"50F21A3C-0AC3-48C5-A4F8-5A7B478875B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-008:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E974DC6-F7D9-4389-9AF9-863F6E419CE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-001:*:*:*:*:*:*\",\"matchCriteriaId\":\"156A6382-2BD3-4882-90B2-8E7CF6659E17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-002:*:*:*:*:*:*\",\"matchCriteriaId\":\"20A2FDB2-6712-406A-9896-C0B44508B07D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-003:*:*:*:*:*:*\",\"matchCriteriaId\":\"49F537A0-DC42-4176-B22F-C80D179DD99D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.15.7\",\"matchCriteriaId\":\"3BD2A211-4E62-40BF-9BA0-5239FA6F0AF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.0\",\"versionEndExcluding\":\"11.6.6\",\"matchCriteriaId\":\"09A6345C-D813-43BA-B12E-789C80653F86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.0\",\"versionEndIncluding\":\"12.4\",\"matchCriteriaId\":\"C1131B2D-ED10-4106-A38B-C2EE9F15863E\"}]}]}],\"references\":[{\"url\":\"http://seclists.org/fulldisclosure/2022/May/33\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2022/May/35\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2022/May/38\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/03/14/3\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://httpd.apache.org/security/vulnerabilities_24.html\",\"source\":\"security@apache.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/\",\"source\":\"security@apache.org\"},{\"url\":\"https://security.gentoo.org/glsa/202208-20\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20220321-0001/\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT213255\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT213256\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT213257\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuapr2022.html\",\"source\":\"security@apache.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujul2022.html\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2022/May/33\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2022/May/35\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2022/May/38\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/03/14/3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://httpd.apache.org/security/vulnerabilities_24.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/202208-20\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20220321-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT213255\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT213256\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT213257\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuapr2022.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujul2022.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
RHSA-2022:1137
Vulnerability from csaf_redhat
Published
2022-04-01 22:26
Modified
2025-02-28 01:33
Summary
Red Hat Security Advisory: httpd security update
Notes
Topic
An update for httpd is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_lua: Possible buffer overflow when parsing multipart content (CVE-2021-44790)
* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for httpd is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: mod_lua: Possible buffer overflow when parsing multipart content (CVE-2021-44790)\n\n* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1137", "url": "https://access.redhat.com/errata/RHSA-2022:1137" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2034674", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034674" }, { "category": "external", "summary": "2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1137.json" } ], "title": "Red Hat Security Advisory: httpd security update", "tracking": { "current_release_date": "2025-02-28T01:33:50+00:00", "generator": { "date": "2025-02-28T01:33:50+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.3.1" } }, "id": "RHSA-2022:1137", "initial_release_date": "2022-04-01T22:26:41+00:00", "revision_history": [ { "date": "2022-04-01T22:26:41+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-04-01T22:26:41+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-02-28T01:33:50+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:7.7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server E4S (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:7.7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server TUS (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:7.7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:7.7::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-90.el7_7.3.src", "product": { "name": "httpd-0:2.4.6-90.el7_7.3.src", "product_id": "httpd-0:2.4.6-90.el7_7.3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-90.el7_7.3?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-90.el7_7.3.x86_64", "product": { "name": "httpd-0:2.4.6-90.el7_7.3.x86_64", "product_id": "httpd-0:2.4.6-90.el7_7.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-90.el7_7.3?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "product": { "name": "httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "product_id": "httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-90.el7_7.3?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "product": { "name": "httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "product_id": "httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-90.el7_7.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-90.el7_7.3.x86_64", "product": { "name": "mod_session-0:2.4.6-90.el7_7.3.x86_64", "product_id": "mod_session-0:2.4.6-90.el7_7.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-90.el7_7.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "product": { "name": "mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "product_id": "mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-90.el7_7.3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "product_id": "httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-90.el7_7.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "product": { "name": "mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "product_id": "mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-90.el7_7.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "product": { "name": "mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "product_id": "mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-90.el7_7.3?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-manual-0:2.4.6-90.el7_7.3.noarch", "product": { "name": "httpd-manual-0:2.4.6-90.el7_7.3.noarch", "product_id": "httpd-manual-0:2.4.6-90.el7_7.3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-90.el7_7.3?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-90.el7_7.3.ppc64le", "product": { "name": "httpd-0:2.4.6-90.el7_7.3.ppc64le", "product_id": "httpd-0:2.4.6-90.el7_7.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-90.el7_7.3?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "product": { "name": "httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "product_id": "httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-90.el7_7.3?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "product": { "name": "httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "product_id": "httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-90.el7_7.3?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-90.el7_7.3.ppc64le", "product": { "name": "mod_session-0:2.4.6-90.el7_7.3.ppc64le", "product_id": "mod_session-0:2.4.6-90.el7_7.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-90.el7_7.3?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "product": { "name": "mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "product_id": "mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-90.el7_7.3?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "product_id": "httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-90.el7_7.3?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "product": { "name": "mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "product_id": "mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-90.el7_7.3?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "product_id": "mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-90.el7_7.3?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.3.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src" }, "product_reference": "httpd-0:2.4.6-90.el7_7.3.src", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-90.el7_7.3.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch" }, "product_reference": "httpd-manual-0:2.4.6-90.el7_7.3.noarch", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_session-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.3.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le" }, "product_reference": "httpd-0:2.4.6-90.el7_7.3.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.3.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src" }, "product_reference": "httpd-0:2.4.6-90.el7_7.3.src", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-90.el7_7.3.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le" }, "product_reference": "httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-90.el7_7.3.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch" }, "product_reference": "httpd-manual-0:2.4.6-90.el7_7.3.noarch", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-90.el7_7.3.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le" }, "product_reference": "httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-90.el7_7.3.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le" }, "product_reference": "mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-90.el7_7.3.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le" }, "product_reference": "mod_session-0:2.4.6-90.el7_7.3.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_session-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-90.el7_7.3.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le" }, "product_reference": "mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.3.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src" }, "product_reference": "httpd-0:2.4.6-90.el7_7.3.src", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-90.el7_7.3.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch" }, "product_reference": "httpd-manual-0:2.4.6-90.el7_7.3.noarch", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_session-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.3.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src" }, "product_reference": "httpd-0:2.4.6-90.el7_7.3.src", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-90.el7_7.3.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch" }, "product_reference": "httpd-manual-0:2.4.6-90.el7_7.3.noarch", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_session-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.3.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le" }, "product_reference": "httpd-0:2.4.6-90.el7_7.3.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.3.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src" }, "product_reference": "httpd-0:2.4.6-90.el7_7.3.src", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-90.el7_7.3.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le" }, "product_reference": "httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-90.el7_7.3.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch" }, "product_reference": "httpd-manual-0:2.4.6-90.el7_7.3.noarch", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-90.el7_7.3.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le" }, "product_reference": "httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-90.el7_7.3.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le" }, "product_reference": "mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-90.el7_7.3.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le" }, "product_reference": "mod_session-0:2.4.6-90.el7_7.3.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_session-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-90.el7_7.3.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le" }, "product_reference": "mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.3.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src" }, "product_reference": "httpd-0:2.4.6-90.el7_7.3.src", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-90.el7_7.3.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch" }, "product_reference": "httpd-manual-0:2.4.6-90.el7_7.3.noarch", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_session-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.TUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-44790", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034674" } ], "notes": [ { "category": "description", "text": "A buffer overflow flaw in httpd\u0027s lua module could allow an out-of-bounds write. An attacker who is able to submit a crafted request to an httpd instance that is using the lua module may be able to cause an impact to confidentiality, integrity, and/or availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_lua: Possible buffer overflow when parsing multipart content", "title": "Vulnerability summary" }, { "category": "other", "text": "httpd as shipped in Red Hat Enterprise Linux 6 is NOT affected by this flaw because it does not ship mod_lua.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-44790" }, { "category": "external", "summary": "RHBZ#2034674", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034674" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44790", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44790" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44790", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44790" }, { "category": "external", "summary": "http://httpd.apache.org/security/vulnerabilities_24.html", "url": "http://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-01T22:26:41+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1137" }, { "category": "workaround", "details": "Disabling mod_lua and restarting httpd will mitigate this flaw. See https://access.redhat.com/articles/10649 for more information.", "product_ids": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: mod_lua: Possible buffer overflow when parsing multipart content" }, { "cve": "CVE-2022-22720", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064321" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd. The inbound connection is not closed when it fails to discard the request body, which may expose the server to HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22720" }, { "category": "external", "summary": "RHBZ#2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-01T22:26:41+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1137" }, { "category": "workaround", "details": "There are currently no known mitigations for this issue.", "product_ids": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling" } ] }
rhsa-2022:1389
Vulnerability from csaf_redhat
Published
2022-04-20 19:44
Modified
2025-02-28 01:34
Summary
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP11 security update
Notes
Topic
Updated packages that provide Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 11, fix several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
This release adds the new Apache HTTP Server 2.4.37 Service Pack 11 packages that are part of the JBoss Core Services offering.
This release serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 10 and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes and enhancements included in this release.
Security Fix(es):
* jbcs-httpd24-httpd: httpd: HTTP request smuggling vulnerability in Apache HTTP Server 2.4.52 and earlier (CVE-2022-22720)
* libxml2: use-after-free in xmlXIncludeDoProcess() in xinclude.c (CVE-2021-3518)
* libxml2: heap-based buffer overflow in xmlEncodeEntitiesInternal() in entities.c (CVE-2021-3517)
* libxml2: use-after-free in xmlEncodeEntitiesInternal() in entities.c (CVE-2021-3516)
* libxml2: Exponential entity expansion attack bypasses all existing protection mechanisms (CVE-2021-3541)
* libxml2: NULL pointer dereference when post-validating mixed content parsed in recovery mode (CVE-2021-3537)
* libxml2: Use-after-free of ID and IDREF attributes (CVE-2022-23308)
* openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated packages that provide Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 11, fix several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This release adds the new Apache HTTP Server 2.4.37 Service Pack 11 packages that are part of the JBoss Core Services offering.\n\nThis release serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 10 and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* jbcs-httpd24-httpd: httpd: HTTP request smuggling vulnerability in Apache HTTP Server 2.4.52 and earlier (CVE-2022-22720)\n* libxml2: use-after-free in xmlXIncludeDoProcess() in xinclude.c (CVE-2021-3518)\n* libxml2: heap-based buffer overflow in xmlEncodeEntitiesInternal() in entities.c (CVE-2021-3517)\n* libxml2: use-after-free in xmlEncodeEntitiesInternal() in entities.c (CVE-2021-3516)\n* libxml2: Exponential entity expansion attack bypasses all existing protection mechanisms (CVE-2021-3541)\n* libxml2: NULL pointer dereference when post-validating mixed content parsed in recovery mode (CVE-2021-3537)\n* libxml2: Use-after-free of ID and IDREF attributes (CVE-2022-23308)\n* openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1389", "url": "https://access.redhat.com/errata/RHSA-2022:1389" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1950515", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1950515" }, { "category": "external", "summary": "1954225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954225" }, { "category": "external", "summary": "1954232", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954232" }, { "category": "external", "summary": "1954242", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954242" }, { "category": "external", "summary": "1956522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956522" }, { "category": "external", "summary": "2056913", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056913" }, { "category": "external", "summary": "2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "external", "summary": "2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1389.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP11 security update", "tracking": { "current_release_date": "2025-02-28T01:34:19+00:00", "generator": { "date": "2025-02-28T01:34:19+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.3.1" } }, "id": "RHSA-2022:1389", "initial_release_date": "2022-04-20T19:44:47+00:00", "revision_history": [ { "date": "2022-04-20T19:44:47+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-04-20T19:44:47+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-02-28T01:34:19+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Core Services on RHEL 7 Server", "product": { "name": "Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1::el7" } } }, { "category": "product_name", "name": "Red Hat JBoss Core Services on RHEL 8", "product": { "name": "Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1::el8" } } } ], "category": "product_family", "name": "Red Hat JBoss Core Services" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "product": { "name": "jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "product_id": "jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.1.1g-11.jbcs.el7?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "product": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "product_id": "jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-41.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "product": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "product_id": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11@0.4.10-26.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "product": { "name": "jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "product_id": "jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil@1.0.0-11.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "product": { "name": "jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "product_id": "jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-80.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-41.jbcs.el7?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-68.GA.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk@1.2.48-29.redhat_1.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.16-10.Final_redhat_2.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-22.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "product": { "name": "jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "product_id": "jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util@1.6.1-91.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "product": { "name": "jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "product_id": "jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl@7.78.0-3.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "product": { "name": "jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "product_id": "jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.1.1g-11.el8jbcs?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "product": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "product_id": "jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-41.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "product": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "product_id": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11@0.4.10-26.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "product": { "name": "jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "product_id": "jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil@1.0.0-11.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "product": { "name": "jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "product_id": "jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-80.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "product": { "name": "jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "product_id": "jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-41.el8jbcs?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "product_id": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-68.GA.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "product": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "product_id": "jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-22.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "product": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.16-10.Final_redhat_2.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "product": { "name": "jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "product_id": "jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk@1.2.48-29.redhat_1.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "product": { "name": "jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "product_id": "jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util@1.6.1-91.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "product": { "name": "jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "product_id": "jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl@7.78.0-3.el8jbcs?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.1.1g-11.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.1.1g-11.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.1.1g-11.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.1.1g-11.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.1.1g-11.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.1.1g-11.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-41.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-devel@1.39.2-41.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-debuginfo@1.39.2-41.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11@0.4.10-26.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11-debuginfo@0.4.10-26.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil@1.0.0-11.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil-debuginfo@1.0.0-11.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-80.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.37-80.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.37-80.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.37-80.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.37-80.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.37-80.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.37-80.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.37-80.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.37-80.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-41.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md-debuginfo@2.0.8-41.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-68.GA.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.2-68.GA.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24@1.2.48-29.redhat_1.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-manual@1.2.48-29.redhat_1.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-debuginfo@1.2.48-29.redhat_1.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.16-10.Final_redhat_2.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native-debuginfo@1.3.16-10.Final_redhat_2.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-22.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2-debuginfo@1.15.7-22.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util@1.6.1-91.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-devel@1.6.1-91.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-ldap@1.6.1-91.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-mysql@1.6.1-91.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-nss@1.6.1-91.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-odbc@1.6.1-91.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-openssl@1.6.1-91.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-pgsql@1.6.1-91.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-sqlite@1.6.1-91.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-debuginfo@1.6.1-91.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl@7.78.0-3.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl@7.78.0-3.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl-devel@7.78.0-3.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl-debuginfo@7.78.0-3.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.1.1g-11.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.1.1g-11.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.1.1g-11.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.1.1g-11.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.1.1g-11.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.1.1g-11.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs-debuginfo@1.1.1g-11.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "product_id": "jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-41.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "product_id": "jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-devel@1.39.2-41.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "product_id": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-debuginfo@1.39.2-41.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11@0.4.10-26.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11-debuginfo@0.4.10-26.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil@1.0.0-11.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil-debuginfo@1.0.0-11.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-80.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.37-80.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.37-80.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.37-80.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.37-80.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.37-80.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.37-80.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.37-80.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.37-80.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools-debuginfo@2.4.37-80.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap-debuginfo@2.4.37-80.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html-debuginfo@2.4.37-80.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session-debuginfo@2.4.37-80.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl-debuginfo@2.4.37-80.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-41.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md-debuginfo@2.0.8-41.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-68.GA.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.2-68.GA.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-22.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2-debuginfo@1.15.7-22.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.16-10.Final_redhat_2.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native-debuginfo@1.3.16-10.Final_redhat_2.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24@1.2.48-29.redhat_1.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-manual@1.2.48-29.redhat_1.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24-debuginfo@1.2.48-29.redhat_1.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-devel@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-ldap@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-mysql@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-nss@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-odbc@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-openssl@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-pgsql@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-sqlite@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-debuginfo@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-ldap-debuginfo@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-mysql-debuginfo@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-nss-debuginfo@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-odbc-debuginfo@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-openssl-debuginfo@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-pgsql-debuginfo@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-sqlite-debuginfo@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "product_id": "jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl@7.78.0-3.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "product_id": "jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl@7.78.0-3.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "product_id": "jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl-devel@7.78.0-3.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "product_id": "jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl-debuginfo@7.78.0-3.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "product_id": "jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl-debuginfo@7.78.0-3.el8jbcs?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "product": { "name": "jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "product_id": "jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.37-80.jbcs.el7?arch=noarch" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "product": { "name": "jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "product_id": "jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.37-80.el8jbcs?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch" }, "product_reference": "jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src" }, "product_reference": "jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src" }, "product_reference": "jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch" }, "product_reference": "jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src" }, "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src" }, "product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src" }, "product_reference": "jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src" }, "product_reference": "jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src" }, "product_reference": "jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src" }, "product_reference": "jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src" }, "product_reference": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "zodf0055980" ], "organization": "SQLab NCTU Taiwan" } ], "cve": "CVE-2021-3516", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-04-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1954225" } ], "notes": [ { "category": "description", "text": "There\u0027s a flaw in libxml2\u0027s xmllint. An attacker who is able to submit a crafted file to be processed by xmllint could trigger a use-after-free. The greatest impact of this flaw is to confidentiality, integrity, and availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Use-after-free in xmlEncodeEntitiesInternal() in entities.c", "title": "Vulnerability summary" }, { "category": "other", "text": "The only known exploitation path of this flaw is via the xmllint tool.\n\nThis flaw is out of support scope for Red Hat Enterprise Linux 6 and 7. To learn more about Red Hat Enterprise Linux support life cycles, please see https://access.redhat.com/support/policy/updates/errata .", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3516" }, { "category": "external", "summary": "RHBZ#1954225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954225" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3516", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3516" } ], "release_date": "2021-04-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:44:47+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1389" }, { "category": "workaround", "details": "This flaw can be mitigated by not using xmllint with the --html and --push options together.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Use-after-free in xmlEncodeEntitiesInternal() in entities.c" }, { "acknowledgments": [ { "names": [ "zodf0055980" ], "organization": "SQLab NCTU Taiwan" } ], "cve": "CVE-2021-3517", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-04-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1954232" } ], "notes": [ { "category": "description", "text": "There is a flaw in the xml entity encoding functionality of libxml2. An attacker who is able to supply a crafted file to be processed by an application linked with the affected functionality of libxml2 could trigger an out-of-bounds read. The most likely impact of this flaw is to application availability, with some potential impact to confidentiality and integrity if an attacker is able to use memory information to further exploit the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Heap-based buffer overflow in xmlEncodeEntitiesInternal() in entities.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is out of support scope for Red Hat Enterprise Linux 6 and 7. To learn more about Red Hat Enterprise Linux support life cycles, please see https://access.redhat.com/support/policy/updates/errata .", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3517" }, { "category": "external", "summary": "RHBZ#1954232", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954232" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3517", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3517" } ], "release_date": "2021-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:44:47+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1389" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Heap-based buffer overflow in xmlEncodeEntitiesInternal() in entities.c" }, { "acknowledgments": [ { "names": [ "zodf0055980" ], "organization": "SQLab NCTU Taiwan" } ], "cve": "CVE-2021-3518", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-04-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1954242" } ], "notes": [ { "category": "description", "text": "There\u0027s a flaw in libxml2. An attacker who is able to submit a crafted file to be processed by an application linked with libxml2 could trigger a use-after-free. The greatest impact from this flaw is to confidentiality, integrity, and availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Use-after-free in xmlXIncludeDoProcess() in xinclude.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is out of support scope for Red Hat Enterprise Linux 6 and 7. To learn more about Red Hat Enterprise Linux support life cycles, please see https://access.redhat.com/support/policy/updates/errata .", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3518" }, { "category": "external", "summary": "RHBZ#1954242", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954242" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3518", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3518" } ], "release_date": "2021-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:44:47+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1389" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Use-after-free in xmlXIncludeDoProcess() in xinclude.c" }, { "acknowledgments": [ { "names": [ "yuawn" ], "organization": "NSLab NTU Taiwan" } ], "cve": "CVE-2021-3537", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2021-05-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1956522" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in libxml2, where it did not propagate errors while parsing XML mixed content. This flaw causes the application to crash if an untrusted XML document is parsed in recovery mode and post validated. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: NULL pointer dereference when post-validating mixed content parsed in recovery mode", "title": "Vulnerability summary" }, { "category": "other", "text": "For the flaw to be exploitable, the document must be parsed in recovery mode and post validated (e.g.: when used in the `xmlling` tool, both `-recover` and `-postvalid` options must be used for the flaw to be exploitable)", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3537" }, { "category": "external", "summary": "RHBZ#1956522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956522" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3537", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3537" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3537", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3537" } ], "release_date": "2021-05-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:44:47+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1389" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: NULL pointer dereference when post-validating mixed content parsed in recovery mode" }, { "acknowledgments": [ { "names": [ "Sebastian Pipping" ] } ], "cve": "CVE-2021-3541", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1950515" } ], "notes": [ { "category": "description", "text": "A flaw was found in libxml2. Exponential entity expansion attack its possible bypassing all existing protection mechanisms and leading to denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Exponential entity expansion attack bypasses all existing protection mechanisms", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3541" }, { "category": "external", "summary": "RHBZ#1950515", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1950515" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3541", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3541" } ], "release_date": "2021-05-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:44:47+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1389" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Exponential entity expansion attack bypasses all existing protection mechanisms" }, { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2022-03-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2062202" } ], "notes": [ { "category": "description", "text": "A flaw was found in OpenSSL. It is possible to trigger an infinite loop by crafting a certificate that has invalid elliptic curve parameters. Since certificate parsing happens before verification of the certificate signature, any process that parses an externally supplied certificate may be subject to a denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates", "title": "Vulnerability summary" }, { "category": "other", "text": "While Red Hat initially stated not to be directly affected by this flaw, after further investigation we found that the versions of OpenSSL as shipped in Red Hat Enterprise Linux 6, 7, and 8 are vulnerable to a denial of service attack through malicious Elliptic Curve parameters. During processing of the parameters OpenSSL will call BN_mod_sqrt() with invalid arguments, causing the process to enter an infinite loop. The invalid EC parameters can be provided to OpenSSL through X.509 certificates (used in TLS connections), through public and private keys, through certificate signing requests and other places where applications process Elliptic Curve parameters. The flaw has been rated as having a security impact of Important. A future update will address this issue in Red Hat Enterprise Linux 6, 7 and 8.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0778" }, { "category": "external", "summary": "RHBZ#2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0778", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0778" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20220315.txt", "url": "https://www.openssl.org/news/secadv/20220315.txt" } ], "release_date": "2022-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:44:47+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1389" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates" }, { "cve": "CVE-2022-22720", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064321" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd. The inbound connection is not closed when it fails to discard the request body, which may expose the server to HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22720" }, { "category": "external", "summary": "RHBZ#2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:44:47+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1389" }, { "category": "workaround", "details": "There are currently no known mitigations for this issue.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling" }, { "cve": "CVE-2022-23308", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-02-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2056913" } ], "notes": [ { "category": "description", "text": "A flaw was found in libxml2. A call to the xmlGetID function can return a pointer already freed when parsing an XML document with the XML_PARSE_DTDVALID option and without the XML_PARSE_NOENT option, resulting in a use-after-free issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Use-after-free of ID and IDREF attributes", "title": "Vulnerability summary" }, { "category": "other", "text": "The security impact of xmlGetID() returning a pointer to freed memory depends on the application and will mostly result in a denial of service (DoS). The typical use case of calling xmlGetID() on an unmodified document is not affected, therefore this issue was rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23308" }, { "category": "external", "summary": "RHBZ#2056913", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056913" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23308", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23308" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23308", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23308" } ], "release_date": "2022-02-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:44:47+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1389" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Use-after-free of ID and IDREF attributes" } ] }
RHSA-2022:1045
Vulnerability from csaf_redhat
Published
2022-03-24 10:50
Modified
2025-02-28 01:29
Summary
Red Hat Security Advisory: httpd security update
Notes
Topic
An update for httpd is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for httpd is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1045", "url": "https://access.redhat.com/errata/RHSA-2022:1045" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1045.json" } ], "title": "Red Hat Security Advisory: httpd security update", "tracking": { "current_release_date": "2025-02-28T01:29:35+00:00", "generator": { "date": "2025-02-28T01:29:35+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.3.1" } }, "id": "RHSA-2022:1045", "initial_release_date": "2022-03-24T10:50:16+00:00", "revision_history": [ { "date": "2022-03-24T10:50:16+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-03-24T10:50:16+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-02-28T01:29:35+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-97.el7_9.5.src", "product": { "name": "httpd-0:2.4.6-97.el7_9.5.src", "product_id": "httpd-0:2.4.6-97.el7_9.5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-97.el7_9.5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-97.el7_9.5.x86_64", "product": { "name": "httpd-0:2.4.6-97.el7_9.5.x86_64", "product_id": "httpd-0:2.4.6-97.el7_9.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-97.el7_9.5?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "product": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "product_id": "httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-97.el7_9.5?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "product": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "product_id": "httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-97.el7_9.5?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "product": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "product_id": "mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-97.el7_9.5?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "product": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "product_id": "mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-97.el7_9.5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-97.el7_9.5.x86_64", "product": { "name": "mod_session-0:2.4.6-97.el7_9.5.x86_64", "product_id": "mod_session-0:2.4.6-97.el7_9.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-97.el7_9.5?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "product": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "product_id": "mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-97.el7_9.5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "product_id": "httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-97.el7_9.5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-manual-0:2.4.6-97.el7_9.5.noarch", "product": { "name": "httpd-manual-0:2.4.6-97.el7_9.5.noarch", "product_id": "httpd-manual-0:2.4.6-97.el7_9.5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-97.el7_9.5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-97.el7_9.5.ppc64le", "product": { "name": "httpd-0:2.4.6-97.el7_9.5.ppc64le", "product_id": "httpd-0:2.4.6-97.el7_9.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-97.el7_9.5?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "product": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "product_id": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-97.el7_9.5?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "product": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "product_id": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-97.el7_9.5?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-97.el7_9.5.ppc64le", "product": { "name": "mod_session-0:2.4.6-97.el7_9.5.ppc64le", "product_id": "mod_session-0:2.4.6-97.el7_9.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-97.el7_9.5?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "product": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "product_id": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-97.el7_9.5?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "product_id": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-97.el7_9.5?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "product": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "product_id": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-97.el7_9.5?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "product_id": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-97.el7_9.5?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-97.el7_9.5.ppc64", "product": { "name": "httpd-0:2.4.6-97.el7_9.5.ppc64", "product_id": "httpd-0:2.4.6-97.el7_9.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-97.el7_9.5?arch=ppc64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "product": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "product_id": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-97.el7_9.5?arch=ppc64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "product": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "product_id": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-97.el7_9.5?arch=ppc64" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-97.el7_9.5.ppc64", "product": { "name": "mod_session-0:2.4.6-97.el7_9.5.ppc64", "product_id": "mod_session-0:2.4.6-97.el7_9.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-97.el7_9.5?arch=ppc64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "product": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "product_id": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-97.el7_9.5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "product": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "product_id": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-97.el7_9.5?arch=ppc64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "product": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "product_id": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-97.el7_9.5?arch=ppc64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "product": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "product_id": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-97.el7_9.5?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-97.el7_9.5.s390x", "product": { "name": "httpd-0:2.4.6-97.el7_9.5.s390x", "product_id": "httpd-0:2.4.6-97.el7_9.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-97.el7_9.5?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-97.el7_9.5.s390x", "product": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.s390x", "product_id": "httpd-devel-0:2.4.6-97.el7_9.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-97.el7_9.5?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-97.el7_9.5.s390x", "product": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.s390x", "product_id": "httpd-tools-0:2.4.6-97.el7_9.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-97.el7_9.5?arch=s390x" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-97.el7_9.5.s390x", "product": { "name": "mod_session-0:2.4.6-97.el7_9.5.s390x", "product_id": "mod_session-0:2.4.6-97.el7_9.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-97.el7_9.5?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-97.el7_9.5.s390x", "product": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.s390x", "product_id": "mod_ssl-1:2.4.6-97.el7_9.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-97.el7_9.5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "product": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "product_id": "httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-97.el7_9.5?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-97.el7_9.5.s390x", "product": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.s390x", "product_id": "mod_ldap-0:2.4.6-97.el7_9.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-97.el7_9.5?arch=s390x" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "product": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "product_id": "mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-97.el7_9.5?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.src", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-97.el7_9.5.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch" }, "product_reference": "httpd-manual-0:2.4.6-97.el7_9.5.noarch", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.src", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-97.el7_9.5.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch" }, "product_reference": "httpd-manual-0:2.4.6-97.el7_9.5.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.src", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-97.el7_9.5.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch" }, "product_reference": "httpd-manual-0:2.4.6-97.el7_9.5.noarch", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.src", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-97.el7_9.5.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch" }, "product_reference": "httpd-manual-0:2.4.6-97.el7_9.5.noarch", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.src", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-97.el7_9.5.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch" }, "product_reference": "httpd-manual-0:2.4.6-97.el7_9.5.noarch", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.src", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-97.el7_9.5.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch" }, "product_reference": "httpd-manual-0:2.4.6-97.el7_9.5.noarch", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-22720", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064321" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd. The inbound connection is not closed when it fails to discard the request body, which may expose the server to HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22720" }, { "category": "external", "summary": "RHBZ#2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-24T10:50:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1045" }, { "category": "workaround", "details": "There are currently no known mitigations for this issue.", "product_ids": [ "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling" } ] }
RHSA-2022:1072
Vulnerability from csaf_redhat
Published
2022-03-28 10:39
Modified
2025-02-28 01:29
Summary
Red Hat Security Advisory: httpd:2.4 security update
Notes
Topic
An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1072", "url": "https://access.redhat.com/errata/RHSA-2022:1072" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1072.json" } ], "title": "Red Hat Security Advisory: httpd:2.4 security update", "tracking": { "current_release_date": "2025-02-28T01:29:50+00:00", "generator": { "date": "2025-02-28T01:29:50+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.3.1" } }, "id": "RHSA-2022:1072", "initial_release_date": "2022-03-28T10:39:35+00:00", "revision_history": [ { "date": "2022-03-28T10:39:35+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-03-28T10:39:35+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-02-28T01:29:50+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.4::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd:2.4:8040020220321171351:522a0ee4", "product": { "name": "httpd:2.4:8040020220321171351:522a0ee4", "product_id": "httpd:2.4:8040020220321171351:522a0ee4", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/httpd@2.4:8040020220321171351:522a0ee4" } } }, { "category": "product_version", "name": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch", "product": { "name": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch", "product_id": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=noarch" } } }, { "category": "product_version", "name": "httpd-manual-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch", "product": { "name": "httpd-manual-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch", "product_id": "httpd-manual-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product": { "name": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_id": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product": { "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_id": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product": { "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_id": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product": { "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_id": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product": { "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_id": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_id": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product_id": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product_id": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product_id": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product": { "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_id": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_id": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product": { "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_id": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product": { "name": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_id": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product": { "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_id": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product": { "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_id": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_id": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.src", "product": { "name": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.src", "product_id": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=src" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src", "product": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src", "product_id": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=src" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product": { "name": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_id": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_id": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product": { "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_id": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product": { "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_id": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product": { "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_id": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_id": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product_id": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product_id": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product_id": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product": { "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_id": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_id": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_id": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product": { "name": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_id": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product": { "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_id": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product": { "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_id": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_id": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product": { "name": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_id": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product": { "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_id": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product": { "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_id": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product": { "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_id": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product": { "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_id": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_id": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product_id": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product_id": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product_id": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product": { "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_id": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_id": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=s390x" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product": { "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_id": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product": { "name": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_id": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=s390x" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product": { "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_id": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product": { "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_id": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_id": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product": { "name": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_id": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_id": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product": { "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_id": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product": { "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_id": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product": { "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_id": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_id": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product_id": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product_id": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product_id": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product": { "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_id": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_id": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product": { "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_id": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product": { "name": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_id": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product": { "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_id": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product": { "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_id": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_id": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, "product_reference": "httpd:2.4:8040020220321171351:522a0ee4", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64" }, "product_reference": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le" }, "product_reference": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x" }, "product_reference": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.src as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.src" }, "product_reference": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.src", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" }, "product_reference": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64" }, "product_reference": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64" }, "product_reference": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le" }, "product_reference": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x" }, "product_reference": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64" }, "product_reference": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le" }, "product_reference": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x" }, "product_reference": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch" }, "product_reference": "httpd-manual-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64" }, "product_reference": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le" }, "product_reference": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x" }, "product_reference": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le" }, "product_reference": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x" }, "product_reference": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64" }, "product_reference": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le" }, "product_reference": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x" }, "product_reference": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64" }, "product_reference": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x" }, "product_reference": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64" }, "product_reference": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le" }, "product_reference": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x" }, "product_reference": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" }, "product_reference": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le" }, "product_reference": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x" }, "product_reference": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64" }, "product_reference": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le" }, "product_reference": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x" }, "product_reference": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-22720", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064321" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd. The inbound connection is not closed when it fails to discard the request body, which may expose the server to HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.src", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22720" }, { "category": "external", "summary": "RHBZ#2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-28T10:39:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.src", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1072" }, { "category": "workaround", "details": "There are currently no known mitigations for this issue.", "product_ids": [ "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.src", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.src", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling" } ] }
rhsa-2022:1139
Vulnerability from csaf_redhat
Published
2022-04-01 22:26
Modified
2025-02-28 01:33
Summary
Red Hat Security Advisory: httpd security update
Notes
Topic
An update for httpd is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_lua: Possible buffer overflow when parsing multipart content (CVE-2021-44790)
* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for httpd is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: mod_lua: Possible buffer overflow when parsing multipart content (CVE-2021-44790)\n\n* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1139", "url": "https://access.redhat.com/errata/RHSA-2022:1139" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2034674", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034674" }, { "category": "external", "summary": "2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1139.json" } ], "title": "Red Hat Security Advisory: httpd security update", "tracking": { "current_release_date": "2025-02-28T01:33:33+00:00", "generator": { "date": "2025-02-28T01:33:33+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.3.1" } }, "id": "RHSA-2022:1139", "initial_release_date": "2022-04-01T22:26:42+00:00", "revision_history": [ { "date": "2022-04-01T22:26:42+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-04-01T22:26:42+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-02-28T01:33:33+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 7.3)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.3::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.3::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-45.el7_3.8.src", "product": { "name": "httpd-0:2.4.6-45.el7_3.8.src", "product_id": "httpd-0:2.4.6-45.el7_3.8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-45.el7_3.8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-45.el7_3.8.x86_64", "product": { "name": "httpd-0:2.4.6-45.el7_3.8.x86_64", "product_id": "httpd-0:2.4.6-45.el7_3.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-45.el7_3.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "product": { "name": "httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "product_id": "httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-45.el7_3.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "product": { "name": "httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "product_id": "httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-45.el7_3.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-45.el7_3.8.x86_64", "product": { "name": "mod_ssl-1:2.4.6-45.el7_3.8.x86_64", "product_id": "mod_ssl-1:2.4.6-45.el7_3.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-45.el7_3.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "product_id": "httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-45.el7_3.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "product": { "name": "mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "product_id": "mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-45.el7_3.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "product": { "name": "mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "product_id": "mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-45.el7_3.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-45.el7_3.8.x86_64", "product": { "name": "mod_session-0:2.4.6-45.el7_3.8.x86_64", "product_id": "mod_session-0:2.4.6-45.el7_3.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-45.el7_3.8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-manual-0:2.4.6-45.el7_3.8.noarch", "product": { "name": "httpd-manual-0:2.4.6-45.el7_3.8.noarch", "product_id": "httpd-manual-0:2.4.6-45.el7_3.8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-45.el7_3.8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-45.el7_3.8.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src" }, "product_reference": "httpd-0:2.4.6-45.el7_3.8.src", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-45.el7_3.8.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64" }, "product_reference": "httpd-0:2.4.6-45.el7_3.8.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-45.el7_3.8.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-45.el7_3.8.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch" }, "product_reference": "httpd-manual-0:2.4.6-45.el7_3.8.noarch", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-45.el7_3.8.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-45.el7_3.8.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-45.el7_3.8.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64" }, "product_reference": "mod_session-0:2.4.6-45.el7_3.8.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-45.el7_3.8.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-45.el7_3.8.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-45.el7_3.8.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src" }, "product_reference": "httpd-0:2.4.6-45.el7_3.8.src", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-45.el7_3.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64" }, "product_reference": "httpd-0:2.4.6-45.el7_3.8.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-45.el7_3.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-45.el7_3.8.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch" }, "product_reference": "httpd-manual-0:2.4.6-45.el7_3.8.noarch", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-45.el7_3.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-45.el7_3.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-45.el7_3.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64" }, "product_reference": "mod_session-0:2.4.6-45.el7_3.8.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-45.el7_3.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-45.el7_3.8.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-44790", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034674" } ], "notes": [ { "category": "description", "text": "A buffer overflow flaw in httpd\u0027s lua module could allow an out-of-bounds write. An attacker who is able to submit a crafted request to an httpd instance that is using the lua module may be able to cause an impact to confidentiality, integrity, and/or availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_lua: Possible buffer overflow when parsing multipart content", "title": "Vulnerability summary" }, { "category": "other", "text": "httpd as shipped in Red Hat Enterprise Linux 6 is NOT affected by this flaw because it does not ship mod_lua.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src", "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch", "7Server-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src", "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch", "7Server-optional-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-44790" }, { "category": "external", "summary": "RHBZ#2034674", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034674" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44790", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44790" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44790", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44790" }, { "category": "external", "summary": "http://httpd.apache.org/security/vulnerabilities_24.html", "url": "http://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-01T22:26:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src", "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch", "7Server-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src", "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch", "7Server-optional-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1139" }, { "category": "workaround", "details": "Disabling mod_lua and restarting httpd will mitigate this flaw. See https://access.redhat.com/articles/10649 for more information.", "product_ids": [ "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src", "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch", "7Server-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src", "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch", "7Server-optional-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src", "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch", "7Server-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src", "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch", "7Server-optional-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: mod_lua: Possible buffer overflow when parsing multipart content" }, { "cve": "CVE-2022-22720", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064321" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd. The inbound connection is not closed when it fails to discard the request body, which may expose the server to HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src", "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch", "7Server-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src", "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch", "7Server-optional-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22720" }, { "category": "external", "summary": "RHBZ#2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-01T22:26:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src", "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch", "7Server-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src", "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch", "7Server-optional-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1139" }, { "category": "workaround", "details": "There are currently no known mitigations for this issue.", "product_ids": [ "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src", "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch", "7Server-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src", "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch", "7Server-optional-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src", "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch", "7Server-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src", "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch", "7Server-optional-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling" } ] }
rhsa-2022:1137
Vulnerability from csaf_redhat
Published
2022-04-01 22:26
Modified
2025-02-28 01:33
Summary
Red Hat Security Advisory: httpd security update
Notes
Topic
An update for httpd is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_lua: Possible buffer overflow when parsing multipart content (CVE-2021-44790)
* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for httpd is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: mod_lua: Possible buffer overflow when parsing multipart content (CVE-2021-44790)\n\n* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1137", "url": "https://access.redhat.com/errata/RHSA-2022:1137" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2034674", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034674" }, { "category": "external", "summary": "2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1137.json" } ], "title": "Red Hat Security Advisory: httpd security update", "tracking": { "current_release_date": "2025-02-28T01:33:50+00:00", "generator": { "date": "2025-02-28T01:33:50+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.3.1" } }, "id": "RHSA-2022:1137", "initial_release_date": "2022-04-01T22:26:41+00:00", "revision_history": [ { "date": "2022-04-01T22:26:41+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-04-01T22:26:41+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-02-28T01:33:50+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:7.7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server E4S (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:7.7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server TUS (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:7.7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:7.7::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-90.el7_7.3.src", "product": { "name": "httpd-0:2.4.6-90.el7_7.3.src", "product_id": "httpd-0:2.4.6-90.el7_7.3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-90.el7_7.3?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-90.el7_7.3.x86_64", "product": { "name": "httpd-0:2.4.6-90.el7_7.3.x86_64", "product_id": "httpd-0:2.4.6-90.el7_7.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-90.el7_7.3?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "product": { "name": "httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "product_id": "httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-90.el7_7.3?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "product": { "name": "httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "product_id": "httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-90.el7_7.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-90.el7_7.3.x86_64", "product": { "name": "mod_session-0:2.4.6-90.el7_7.3.x86_64", "product_id": "mod_session-0:2.4.6-90.el7_7.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-90.el7_7.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "product": { "name": "mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "product_id": "mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-90.el7_7.3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "product_id": "httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-90.el7_7.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "product": { "name": "mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "product_id": "mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-90.el7_7.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "product": { "name": "mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "product_id": "mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-90.el7_7.3?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-manual-0:2.4.6-90.el7_7.3.noarch", "product": { "name": "httpd-manual-0:2.4.6-90.el7_7.3.noarch", "product_id": "httpd-manual-0:2.4.6-90.el7_7.3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-90.el7_7.3?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-90.el7_7.3.ppc64le", "product": { "name": "httpd-0:2.4.6-90.el7_7.3.ppc64le", "product_id": "httpd-0:2.4.6-90.el7_7.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-90.el7_7.3?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "product": { "name": "httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "product_id": "httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-90.el7_7.3?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "product": { "name": "httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "product_id": "httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-90.el7_7.3?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-90.el7_7.3.ppc64le", "product": { "name": "mod_session-0:2.4.6-90.el7_7.3.ppc64le", "product_id": "mod_session-0:2.4.6-90.el7_7.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-90.el7_7.3?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "product": { "name": "mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "product_id": "mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-90.el7_7.3?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "product_id": "httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-90.el7_7.3?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "product": { "name": "mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "product_id": "mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-90.el7_7.3?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "product_id": "mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-90.el7_7.3?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.3.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src" }, "product_reference": "httpd-0:2.4.6-90.el7_7.3.src", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-90.el7_7.3.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch" }, "product_reference": "httpd-manual-0:2.4.6-90.el7_7.3.noarch", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_session-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.3.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le" }, "product_reference": "httpd-0:2.4.6-90.el7_7.3.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.3.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src" }, "product_reference": "httpd-0:2.4.6-90.el7_7.3.src", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-90.el7_7.3.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le" }, "product_reference": "httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-90.el7_7.3.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch" }, "product_reference": "httpd-manual-0:2.4.6-90.el7_7.3.noarch", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-90.el7_7.3.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le" }, "product_reference": "httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-90.el7_7.3.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le" }, "product_reference": "mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-90.el7_7.3.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le" }, "product_reference": "mod_session-0:2.4.6-90.el7_7.3.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_session-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-90.el7_7.3.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le" }, "product_reference": "mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.3.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src" }, "product_reference": "httpd-0:2.4.6-90.el7_7.3.src", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-90.el7_7.3.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch" }, "product_reference": "httpd-manual-0:2.4.6-90.el7_7.3.noarch", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_session-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.3.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src" }, "product_reference": "httpd-0:2.4.6-90.el7_7.3.src", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-90.el7_7.3.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch" }, "product_reference": "httpd-manual-0:2.4.6-90.el7_7.3.noarch", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_session-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.3.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le" }, "product_reference": "httpd-0:2.4.6-90.el7_7.3.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.3.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src" }, "product_reference": "httpd-0:2.4.6-90.el7_7.3.src", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-90.el7_7.3.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le" }, "product_reference": "httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-90.el7_7.3.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch" }, "product_reference": "httpd-manual-0:2.4.6-90.el7_7.3.noarch", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-90.el7_7.3.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le" }, "product_reference": "httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-90.el7_7.3.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le" }, "product_reference": "mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-90.el7_7.3.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le" }, "product_reference": "mod_session-0:2.4.6-90.el7_7.3.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_session-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-90.el7_7.3.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le" }, "product_reference": "mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.3.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src" }, "product_reference": "httpd-0:2.4.6-90.el7_7.3.src", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-90.el7_7.3.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch" }, "product_reference": "httpd-manual-0:2.4.6-90.el7_7.3.noarch", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_session-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.TUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-44790", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034674" } ], "notes": [ { "category": "description", "text": "A buffer overflow flaw in httpd\u0027s lua module could allow an out-of-bounds write. An attacker who is able to submit a crafted request to an httpd instance that is using the lua module may be able to cause an impact to confidentiality, integrity, and/or availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_lua: Possible buffer overflow when parsing multipart content", "title": "Vulnerability summary" }, { "category": "other", "text": "httpd as shipped in Red Hat Enterprise Linux 6 is NOT affected by this flaw because it does not ship mod_lua.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-44790" }, { "category": "external", "summary": "RHBZ#2034674", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034674" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44790", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44790" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44790", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44790" }, { "category": "external", "summary": "http://httpd.apache.org/security/vulnerabilities_24.html", "url": "http://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-01T22:26:41+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1137" }, { "category": "workaround", "details": "Disabling mod_lua and restarting httpd will mitigate this flaw. See https://access.redhat.com/articles/10649 for more information.", "product_ids": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: mod_lua: Possible buffer overflow when parsing multipart content" }, { "cve": "CVE-2022-22720", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064321" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd. The inbound connection is not closed when it fails to discard the request body, which may expose the server to HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22720" }, { "category": "external", "summary": "RHBZ#2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-01T22:26:41+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1137" }, { "category": "workaround", "details": "There are currently no known mitigations for this issue.", "product_ids": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling" } ] }
rhsa-2022_1080
Vulnerability from csaf_redhat
Published
2022-03-28 11:23
Modified
2024-11-15 14:45
Summary
Red Hat Security Advisory: httpd:2.4 security update
Notes
Topic
An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1080", "url": "https://access.redhat.com/errata/RHSA-2022:1080" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1080.json" } ], "title": "Red Hat Security Advisory: httpd:2.4 security update", "tracking": { "current_release_date": "2024-11-15T14:45:09+00:00", "generator": { "date": "2024-11-15T14:45:09+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:1080", "initial_release_date": "2022-03-28T11:23:46+00:00", "revision_history": [ { "date": "2022-03-28T11:23:46+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-03-28T11:23:46+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T14:45:09+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:8.1::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd:2.4:8010020220321173048:c27ad7f8", "product": { "name": "httpd:2.4:8010020220321173048:c27ad7f8", "product_id": "httpd:2.4:8010020220321173048:c27ad7f8", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/httpd@2.4:8010020220321173048:c27ad7f8" } } }, { "category": "product_version", "name": "httpd-filesystem-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch", "product": { "name": "httpd-filesystem-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch", "product_id": "httpd-filesystem-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=noarch" } } }, { "category": "product_version", "name": "httpd-manual-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch", "product": { "name": "httpd-manual-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch", "product_id": "httpd-manual-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.src", "product": { "name": "httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.src", "product_id": "httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=src" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src", "product": { "name": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src", "product_id": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product": { "name": "httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_id": "httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_id": "httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product": { "name": "httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_id": "httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product": { "name": "httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_id": "httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product": { "name": "httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_id": "httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_id": "httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "product": { "name": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "product_id": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "product": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "product_id": "mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "product": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "product_id": "mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product": { "name": "mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_id": "mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_id": "mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product": { "name": "mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_id": "mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product": { "name": "mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_id": "mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_id": "mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product": { "name": "mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_id": "mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product": { "name": "mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_id": "mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product": { "name": "mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_id": "mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_id": "mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product": { "name": "httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_id": "httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_id": "httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product": { "name": "httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_id": "httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product": { "name": "httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_id": "httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product": { "name": "httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_id": "httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_id": "httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "product": { "name": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "product_id": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "product": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "product_id": "mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "product": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "product_id": "mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product": { "name": "mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_id": "mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_id": "mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product": { "name": "mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_id": "mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product": { "name": "mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_id": "mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product": { "name": "mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_id": "mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product": { "name": "mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_id": "mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product": { "name": "mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_id": "mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product": { "name": "mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_id": "mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_id": "mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, "product_reference": "httpd:2.4:8010020220321173048:c27ad7f8", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le" }, "product_reference": "httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.src as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.src" }, "product_reference": "httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.src", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" }, "product_reference": "httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le" }, "product_reference": "httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le" }, "product_reference": "httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-filesystem-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-manual-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch" }, "product_reference": "httpd-manual-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le" }, "product_reference": "httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le" }, "product_reference": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src" }, "product_reference": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64" }, "product_reference": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le" }, "product_reference": "mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le" }, "product_reference": "mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le" }, "product_reference": "mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le" }, "product_reference": "mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" }, "product_reference": "mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le" }, "product_reference": "mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" }, "product_reference": "mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le" }, "product_reference": "mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" }, "product_reference": "mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le" }, "product_reference": "mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le" }, "product_reference": "mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-22720", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064321" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd. The inbound connection is not closed when it fails to discard the request body, which may expose the server to HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.src", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-filesystem-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-manual-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22720" }, { "category": "external", "summary": "RHBZ#2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-28T11:23:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.src", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-filesystem-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-manual-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1080" }, { "category": "workaround", "details": "There are currently no known mitigations for this issue.", "product_ids": [ "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.src", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-filesystem-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-manual-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.src", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-filesystem-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-manual-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling" } ] }
rhsa-2022_1075
Vulnerability from csaf_redhat
Published
2022-03-28 10:15
Modified
2024-11-15 14:45
Summary
Red Hat Security Advisory: httpd24-httpd security update
Notes
Topic
An update for httpd24-httpd is now available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for httpd24-httpd is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1075", "url": "https://access.redhat.com/errata/RHSA-2022:1075" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1075.json" } ], "title": "Red Hat Security Advisory: httpd24-httpd security update", "tracking": { "current_release_date": "2024-11-15T14:45:03+00:00", "generator": { "date": "2024-11-15T14:45:03+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:1075", "initial_release_date": "2022-03-28T10:15:14+00:00", "revision_history": [ { "date": "2022-03-28T10:15:14+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-03-28T10:15:14+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T14:45:03+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Software Collections for RHEL Workstation(v. 7)", "product": { "name": "Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for RHEL(v. 7)", "product": { "name": "Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } } ], "category": "product_family", "name": "Red Hat Software Collections" }, { "branches": [ { "category": "product_version", "name": "httpd24-httpd-0:2.4.34-23.el7.2.src", "product": { "name": "httpd24-httpd-0:2.4.34-23.el7.2.src", "product_id": "httpd24-httpd-0:2.4.34-23.el7.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.34-23.el7.2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd24-httpd-0:2.4.34-23.el7.2.x86_64", "product": { "name": "httpd24-httpd-0:2.4.34-23.el7.2.x86_64", "product_id": "httpd24-httpd-0:2.4.34-23.el7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.34-23.el7.2?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-httpd-devel-0:2.4.34-23.el7.2.x86_64", "product": { "name": "httpd24-httpd-devel-0:2.4.34-23.el7.2.x86_64", "product_id": "httpd24-httpd-devel-0:2.4.34-23.el7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-devel@2.4.34-23.el7.2?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-httpd-tools-0:2.4.34-23.el7.2.x86_64", "product": { "name": "httpd24-httpd-tools-0:2.4.34-23.el7.2.x86_64", "product_id": "httpd24-httpd-tools-0:2.4.34-23.el7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-tools@2.4.34-23.el7.2?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-mod_ldap-0:2.4.34-23.el7.2.x86_64", "product": { "name": "httpd24-mod_ldap-0:2.4.34-23.el7.2.x86_64", "product_id": "httpd24-mod_ldap-0:2.4.34-23.el7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_ldap@2.4.34-23.el7.2?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.x86_64", "product": { "name": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.x86_64", "product_id": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.34-23.el7.2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd24-mod_session-0:2.4.34-23.el7.2.x86_64", "product": { "name": "httpd24-mod_session-0:2.4.34-23.el7.2.x86_64", "product_id": "httpd24-mod_session-0:2.4.34-23.el7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_session@2.4.34-23.el7.2?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-mod_ssl-1:2.4.34-23.el7.2.x86_64", "product": { "name": "httpd24-mod_ssl-1:2.4.34-23.el7.2.x86_64", "product_id": "httpd24-mod_ssl-1:2.4.34-23.el7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_ssl@2.4.34-23.el7.2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.x86_64", "product": { "name": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.x86_64", "product_id": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.34-23.el7.2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd24-httpd-manual-0:2.4.34-23.el7.2.noarch", "product": { "name": "httpd24-httpd-manual-0:2.4.34-23.el7.2.noarch", "product_id": "httpd24-httpd-manual-0:2.4.34-23.el7.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-manual@2.4.34-23.el7.2?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd24-httpd-0:2.4.34-23.el7.2.s390x", "product": { "name": "httpd24-httpd-0:2.4.34-23.el7.2.s390x", "product_id": "httpd24-httpd-0:2.4.34-23.el7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.34-23.el7.2?arch=s390x" } } }, { "category": "product_version", "name": "httpd24-httpd-devel-0:2.4.34-23.el7.2.s390x", "product": { "name": "httpd24-httpd-devel-0:2.4.34-23.el7.2.s390x", "product_id": "httpd24-httpd-devel-0:2.4.34-23.el7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-devel@2.4.34-23.el7.2?arch=s390x" } } }, { "category": "product_version", "name": "httpd24-httpd-tools-0:2.4.34-23.el7.2.s390x", "product": { "name": "httpd24-httpd-tools-0:2.4.34-23.el7.2.s390x", "product_id": "httpd24-httpd-tools-0:2.4.34-23.el7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-tools@2.4.34-23.el7.2?arch=s390x" } } }, { "category": "product_version", "name": "httpd24-mod_ldap-0:2.4.34-23.el7.2.s390x", "product": { "name": "httpd24-mod_ldap-0:2.4.34-23.el7.2.s390x", "product_id": "httpd24-mod_ldap-0:2.4.34-23.el7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_ldap@2.4.34-23.el7.2?arch=s390x" } } }, { "category": "product_version", "name": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.s390x", "product": { "name": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.s390x", "product_id": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.34-23.el7.2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd24-mod_session-0:2.4.34-23.el7.2.s390x", "product": { "name": "httpd24-mod_session-0:2.4.34-23.el7.2.s390x", "product_id": "httpd24-mod_session-0:2.4.34-23.el7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_session@2.4.34-23.el7.2?arch=s390x" } } }, { "category": "product_version", "name": "httpd24-mod_ssl-1:2.4.34-23.el7.2.s390x", "product": { "name": "httpd24-mod_ssl-1:2.4.34-23.el7.2.s390x", "product_id": "httpd24-mod_ssl-1:2.4.34-23.el7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_ssl@2.4.34-23.el7.2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.s390x", "product": { "name": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.s390x", "product_id": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.34-23.el7.2?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd24-httpd-0:2.4.34-23.el7.2.ppc64le", "product": { "name": "httpd24-httpd-0:2.4.34-23.el7.2.ppc64le", "product_id": "httpd24-httpd-0:2.4.34-23.el7.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.34-23.el7.2?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd24-httpd-devel-0:2.4.34-23.el7.2.ppc64le", "product": { "name": "httpd24-httpd-devel-0:2.4.34-23.el7.2.ppc64le", "product_id": "httpd24-httpd-devel-0:2.4.34-23.el7.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-devel@2.4.34-23.el7.2?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd24-httpd-tools-0:2.4.34-23.el7.2.ppc64le", "product": { "name": "httpd24-httpd-tools-0:2.4.34-23.el7.2.ppc64le", "product_id": "httpd24-httpd-tools-0:2.4.34-23.el7.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-tools@2.4.34-23.el7.2?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd24-mod_ldap-0:2.4.34-23.el7.2.ppc64le", "product": { "name": "httpd24-mod_ldap-0:2.4.34-23.el7.2.ppc64le", "product_id": "httpd24-mod_ldap-0:2.4.34-23.el7.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_ldap@2.4.34-23.el7.2?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.ppc64le", "product": { "name": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.ppc64le", "product_id": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.34-23.el7.2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd24-mod_session-0:2.4.34-23.el7.2.ppc64le", "product": { "name": "httpd24-mod_session-0:2.4.34-23.el7.2.ppc64le", "product_id": "httpd24-mod_session-0:2.4.34-23.el7.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_session@2.4.34-23.el7.2?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd24-mod_ssl-1:2.4.34-23.el7.2.ppc64le", "product": { "name": "httpd24-mod_ssl-1:2.4.34-23.el7.2.ppc64le", "product_id": "httpd24-mod_ssl-1:2.4.34-23.el7.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_ssl@2.4.34-23.el7.2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.ppc64le", "product": { "name": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.ppc64le", "product_id": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.34-23.el7.2?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-23.el7.2.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.ppc64le" }, "product_reference": "httpd24-httpd-0:2.4.34-23.el7.2.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-23.el7.2.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.s390x" }, "product_reference": "httpd24-httpd-0:2.4.34-23.el7.2.s390x", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-23.el7.2.src as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.src" }, "product_reference": "httpd24-httpd-0:2.4.34-23.el7.2.src", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-23.el7.2.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.x86_64" }, "product_reference": "httpd24-httpd-0:2.4.34-23.el7.2.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.ppc64le" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.s390x" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.s390x", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.x86_64" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.34-23.el7.2.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.ppc64le" }, "product_reference": "httpd24-httpd-devel-0:2.4.34-23.el7.2.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.34-23.el7.2.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.s390x" }, "product_reference": "httpd24-httpd-devel-0:2.4.34-23.el7.2.s390x", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.34-23.el7.2.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.x86_64" }, "product_reference": "httpd24-httpd-devel-0:2.4.34-23.el7.2.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-manual-0:2.4.34-23.el7.2.noarch as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.2.noarch" }, "product_reference": "httpd24-httpd-manual-0:2.4.34-23.el7.2.noarch", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.34-23.el7.2.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.ppc64le" }, "product_reference": "httpd24-httpd-tools-0:2.4.34-23.el7.2.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.34-23.el7.2.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.s390x" }, "product_reference": "httpd24-httpd-tools-0:2.4.34-23.el7.2.s390x", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.34-23.el7.2.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.x86_64" }, "product_reference": "httpd24-httpd-tools-0:2.4.34-23.el7.2.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.34-23.el7.2.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.ppc64le" }, "product_reference": "httpd24-mod_ldap-0:2.4.34-23.el7.2.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.34-23.el7.2.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.s390x" }, "product_reference": "httpd24-mod_ldap-0:2.4.34-23.el7.2.s390x", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.34-23.el7.2.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.x86_64" }, "product_reference": "httpd24-mod_ldap-0:2.4.34-23.el7.2.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.ppc64le" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.s390x" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.s390x", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.x86_64" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.34-23.el7.2.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.ppc64le" }, "product_reference": "httpd24-mod_session-0:2.4.34-23.el7.2.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.34-23.el7.2.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.s390x" }, "product_reference": "httpd24-mod_session-0:2.4.34-23.el7.2.s390x", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.34-23.el7.2.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.x86_64" }, "product_reference": "httpd24-mod_session-0:2.4.34-23.el7.2.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.34-23.el7.2.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.ppc64le" }, "product_reference": "httpd24-mod_ssl-1:2.4.34-23.el7.2.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.34-23.el7.2.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.s390x" }, "product_reference": "httpd24-mod_ssl-1:2.4.34-23.el7.2.s390x", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.34-23.el7.2.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.x86_64" }, "product_reference": "httpd24-mod_ssl-1:2.4.34-23.el7.2.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-23.el7.2.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.ppc64le" }, "product_reference": "httpd24-httpd-0:2.4.34-23.el7.2.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-23.el7.2.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.s390x" }, "product_reference": "httpd24-httpd-0:2.4.34-23.el7.2.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-23.el7.2.src as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.src" }, "product_reference": "httpd24-httpd-0:2.4.34-23.el7.2.src", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-23.el7.2.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.x86_64" }, "product_reference": "httpd24-httpd-0:2.4.34-23.el7.2.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.ppc64le" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.s390x" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.x86_64" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.34-23.el7.2.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.ppc64le" }, "product_reference": "httpd24-httpd-devel-0:2.4.34-23.el7.2.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.34-23.el7.2.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.s390x" }, "product_reference": "httpd24-httpd-devel-0:2.4.34-23.el7.2.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.34-23.el7.2.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.x86_64" }, "product_reference": "httpd24-httpd-devel-0:2.4.34-23.el7.2.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-manual-0:2.4.34-23.el7.2.noarch as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.2.noarch" }, "product_reference": "httpd24-httpd-manual-0:2.4.34-23.el7.2.noarch", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.34-23.el7.2.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.ppc64le" }, "product_reference": "httpd24-httpd-tools-0:2.4.34-23.el7.2.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.34-23.el7.2.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.s390x" }, "product_reference": "httpd24-httpd-tools-0:2.4.34-23.el7.2.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.34-23.el7.2.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.x86_64" }, "product_reference": "httpd24-httpd-tools-0:2.4.34-23.el7.2.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.34-23.el7.2.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.ppc64le" }, "product_reference": "httpd24-mod_ldap-0:2.4.34-23.el7.2.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.34-23.el7.2.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.s390x" }, "product_reference": "httpd24-mod_ldap-0:2.4.34-23.el7.2.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.34-23.el7.2.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.x86_64" }, "product_reference": "httpd24-mod_ldap-0:2.4.34-23.el7.2.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.ppc64le" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.s390x" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.x86_64" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.34-23.el7.2.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.ppc64le" }, "product_reference": "httpd24-mod_session-0:2.4.34-23.el7.2.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.34-23.el7.2.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.s390x" }, "product_reference": "httpd24-mod_session-0:2.4.34-23.el7.2.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.34-23.el7.2.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.x86_64" }, "product_reference": "httpd24-mod_session-0:2.4.34-23.el7.2.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.34-23.el7.2.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.ppc64le" }, "product_reference": "httpd24-mod_ssl-1:2.4.34-23.el7.2.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.34-23.el7.2.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.s390x" }, "product_reference": "httpd24-mod_ssl-1:2.4.34-23.el7.2.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.34-23.el7.2.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.x86_64" }, "product_reference": "httpd24-mod_ssl-1:2.4.34-23.el7.2.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.8" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-22720", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064321" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd. The inbound connection is not closed when it fails to discard the request body, which may expose the server to HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.2.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.2.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22720" }, { "category": "external", "summary": "RHBZ#2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-28T10:15:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.2.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.2.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1075" }, { "category": "workaround", "details": "There are currently no known mitigations for this issue.", "product_ids": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.2.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.2.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.2.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.2.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling" } ] }
rhsa-2022_1136
Vulnerability from csaf_redhat
Published
2022-04-01 22:32
Modified
2024-11-15 14:46
Summary
Red Hat Security Advisory: httpd security update
Notes
Topic
An update for httpd is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update Support, and Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_lua: Possible buffer overflow when parsing multipart content (CVE-2021-44790)
* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for httpd is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update Support, and Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: mod_lua: Possible buffer overflow when parsing multipart content (CVE-2021-44790)\n\n* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1136", "url": "https://access.redhat.com/errata/RHSA-2022:1136" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2034674", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034674" }, { "category": "external", "summary": "2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1136.json" } ], "title": "Red Hat Security Advisory: httpd security update", "tracking": { "current_release_date": "2024-11-15T14:46:18+00:00", "generator": { "date": "2024-11-15T14:46:18+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:1136", "initial_release_date": "2022-04-01T22:32:06+00:00", "revision_history": [ { "date": "2022-04-01T22:32:06+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-04-01T22:32:06+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T14:46:18+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 7.6)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server E4S (v. 7.6)", "product": { "name": "Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:7.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product": { "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:7.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server TUS (v. 7.6)", "product": { "name": "Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:7.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product": { "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:7.6::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-89.el7_6.4.src", "product": { "name": "httpd-0:2.4.6-89.el7_6.4.src", "product_id": "httpd-0:2.4.6-89.el7_6.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-89.el7_6.4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-89.el7_6.4.x86_64", "product": { "name": "httpd-0:2.4.6-89.el7_6.4.x86_64", "product_id": "httpd-0:2.4.6-89.el7_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-89.el7_6.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "product": { "name": "httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "product_id": "httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-89.el7_6.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "product": { "name": "httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "product_id": "httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-89.el7_6.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-89.el7_6.4.x86_64", "product": { "name": "mod_session-0:2.4.6-89.el7_6.4.x86_64", "product_id": "mod_session-0:2.4.6-89.el7_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-89.el7_6.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "product": { "name": "mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "product_id": "mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-89.el7_6.4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "product_id": "httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-89.el7_6.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "product": { "name": "mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "product_id": "mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-89.el7_6.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "product": { "name": "mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "product_id": "mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-89.el7_6.4?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-manual-0:2.4.6-89.el7_6.4.noarch", "product": { "name": "httpd-manual-0:2.4.6-89.el7_6.4.noarch", "product_id": "httpd-manual-0:2.4.6-89.el7_6.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-89.el7_6.4?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "product": { "name": "mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "product_id": "mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-89.el7_6.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "product_id": "mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-89.el7_6.4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "product_id": "httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-89.el7_6.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-0:2.4.6-89.el7_6.4.ppc64le", "product": { "name": "httpd-0:2.4.6-89.el7_6.4.ppc64le", "product_id": "httpd-0:2.4.6-89.el7_6.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-89.el7_6.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "product": { "name": "httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "product_id": "httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-89.el7_6.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "product": { "name": "httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "product_id": "httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-89.el7_6.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-89.el7_6.4.ppc64le", "product": { "name": "mod_session-0:2.4.6-89.el7_6.4.ppc64le", "product_id": "mod_session-0:2.4.6-89.el7_6.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-89.el7_6.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "product": { "name": "mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "product_id": "mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-89.el7_6.4?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-89.el7_6.4.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src" }, "product_reference": "httpd-0:2.4.6-89.el7_6.4.src", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-89.el7_6.4.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch" }, "product_reference": "httpd-manual-0:2.4.6-89.el7_6.4.noarch", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_session-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-89.el7_6.4.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le" }, "product_reference": "httpd-0:2.4.6-89.el7_6.4.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-89.el7_6.4.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src" }, "product_reference": "httpd-0:2.4.6-89.el7_6.4.src", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-89.el7_6.4.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le" }, "product_reference": "httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-89.el7_6.4.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch" }, "product_reference": "httpd-manual-0:2.4.6-89.el7_6.4.noarch", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-89.el7_6.4.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le" }, "product_reference": "httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-89.el7_6.4.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le" }, "product_reference": "mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-89.el7_6.4.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le" }, "product_reference": "mod_session-0:2.4.6-89.el7_6.4.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_session-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-89.el7_6.4.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le" }, "product_reference": "mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-89.el7_6.4.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src" }, "product_reference": "httpd-0:2.4.6-89.el7_6.4.src", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-89.el7_6.4.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch" }, "product_reference": "httpd-manual-0:2.4.6-89.el7_6.4.noarch", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_session-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-89.el7_6.4.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src" }, "product_reference": "httpd-0:2.4.6-89.el7_6.4.src", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-89.el7_6.4.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch" }, "product_reference": "httpd-manual-0:2.4.6-89.el7_6.4.noarch", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_session-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-89.el7_6.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le" }, "product_reference": "httpd-0:2.4.6-89.el7_6.4.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-89.el7_6.4.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src" }, "product_reference": "httpd-0:2.4.6-89.el7_6.4.src", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-89.el7_6.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le" }, "product_reference": "httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-89.el7_6.4.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch" }, "product_reference": "httpd-manual-0:2.4.6-89.el7_6.4.noarch", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-89.el7_6.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le" }, "product_reference": "httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-89.el7_6.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le" }, "product_reference": "mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-89.el7_6.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le" }, "product_reference": "mod_session-0:2.4.6-89.el7_6.4.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_session-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-89.el7_6.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le" }, "product_reference": "mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-89.el7_6.4.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src" }, "product_reference": "httpd-0:2.4.6-89.el7_6.4.src", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-89.el7_6.4.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch" }, "product_reference": "httpd-manual-0:2.4.6-89.el7_6.4.noarch", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_session-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.TUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-44790", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034674" } ], "notes": [ { "category": "description", "text": "A buffer overflow flaw in httpd\u0027s lua module could allow an out-of-bounds write. An attacker who is able to submit a crafted request to an httpd instance that is using the lua module may be able to cause an impact to confidentiality, integrity, and/or availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_lua: Possible buffer overflow when parsing multipart content", "title": "Vulnerability summary" }, { "category": "other", "text": "httpd as shipped in Red Hat Enterprise Linux 6 is NOT affected by this flaw because it does not ship mod_lua.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-44790" }, { "category": "external", "summary": "RHBZ#2034674", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034674" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44790", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44790" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44790", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44790" }, { "category": "external", "summary": "http://httpd.apache.org/security/vulnerabilities_24.html", "url": "http://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-01T22:32:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1136" }, { "category": "workaround", "details": "Disabling mod_lua and restarting httpd will mitigate this flaw. See https://access.redhat.com/articles/10649 for more information.", "product_ids": [ "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: mod_lua: Possible buffer overflow when parsing multipart content" }, { "cve": "CVE-2022-22720", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064321" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd. The inbound connection is not closed when it fails to discard the request body, which may expose the server to HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22720" }, { "category": "external", "summary": "RHBZ#2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-01T22:32:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1136" }, { "category": "workaround", "details": "There are currently no known mitigations for this issue.", "product_ids": [ "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling" } ] }
rhsa-2022:1390
Vulnerability from csaf_redhat
Published
2022-04-20 19:30
Modified
2025-02-28 01:34
Summary
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP11 security update
Notes
Topic
Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 11 zip release for Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 8, and Microsoft Windows is available.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.
This release adds the new Apache HTTP Server 2.4.37 Service Pack 11 packages that are part of the JBoss Core Services offering.
This release serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 10 and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes and enhancements included in this release.
Security Fix(es):
* jbcs-httpd24-httpd: httpd: HTTP request smuggling vulnerability in Apache HTTP Server 2.4.52 and earlier (CVE-2022-22720)
* libxml2: use-after-free in xmlXIncludeDoProcess() in xinclude.c (CVE-2021-3518)
* libxml2: heap-based buffer overflow in xmlEncodeEntitiesInternal() in entities.c (CVE-2021-3517)
* libxml2: use-after-free in xmlEncodeEntitiesInternal() in entities.c (CVE-2021-3516)
* libxml2: Exponential entity expansion attack bypasses all existing protection mechanisms (CVE-2021-3541)
* libxml2: NULL pointer dereference when post-validating mixed content parsed in recovery mode (CVE-2021-3537)
* libxml2: Use-after-free of ID and IDREF attributes (CVE-2022-23308)
* openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 11 zip release for Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 8, and Microsoft Windows is available.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.\n\nThis release adds the new Apache HTTP Server 2.4.37 Service Pack 11 packages that are part of the JBoss Core Services offering.\n\nThis release serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 10 and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* jbcs-httpd24-httpd: httpd: HTTP request smuggling vulnerability in Apache HTTP Server 2.4.52 and earlier (CVE-2022-22720)\n* libxml2: use-after-free in xmlXIncludeDoProcess() in xinclude.c (CVE-2021-3518)\n* libxml2: heap-based buffer overflow in xmlEncodeEntitiesInternal() in entities.c (CVE-2021-3517)\n* libxml2: use-after-free in xmlEncodeEntitiesInternal() in entities.c (CVE-2021-3516)\n* libxml2: Exponential entity expansion attack bypasses all existing protection mechanisms (CVE-2021-3541)\n* libxml2: NULL pointer dereference when post-validating mixed content parsed in recovery mode (CVE-2021-3537)\n* libxml2: Use-after-free of ID and IDREF attributes (CVE-2022-23308)\n* openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1390", "url": "https://access.redhat.com/errata/RHSA-2022:1390" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1950515", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1950515" }, { "category": "external", "summary": "1954225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954225" }, { "category": "external", "summary": "1954232", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954232" }, { "category": "external", "summary": "1954242", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954242" }, { "category": "external", "summary": "1956522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956522" }, { "category": "external", "summary": "2056913", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056913" }, { "category": "external", "summary": "2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "external", "summary": "2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1390.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP11 security update", "tracking": { "current_release_date": "2025-02-28T01:34:28+00:00", "generator": { "date": "2025-02-28T01:34:28+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.3.1" } }, "id": "RHSA-2022:1390", "initial_release_date": "2022-04-20T19:30:18+00:00", "revision_history": [ { "date": "2022-04-20T19:30:18+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-04-20T19:30:18+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-02-28T01:34:28+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Text-Only JBCS", "product": { "name": "Text-Only JBCS", "product_id": "Text-Only JBCS", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1" } } } ], "category": "product_family", "name": "Red Hat JBoss Core Services" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "zodf0055980" ], "organization": "SQLab NCTU Taiwan" } ], "cve": "CVE-2021-3516", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-04-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1954225" } ], "notes": [ { "category": "description", "text": "There\u0027s a flaw in libxml2\u0027s xmllint. An attacker who is able to submit a crafted file to be processed by xmllint could trigger a use-after-free. The greatest impact of this flaw is to confidentiality, integrity, and availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Use-after-free in xmlEncodeEntitiesInternal() in entities.c", "title": "Vulnerability summary" }, { "category": "other", "text": "The only known exploitation path of this flaw is via the xmllint tool.\n\nThis flaw is out of support scope for Red Hat Enterprise Linux 6 and 7. To learn more about Red Hat Enterprise Linux support life cycles, please see https://access.redhat.com/support/policy/updates/errata .", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only JBCS" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3516" }, { "category": "external", "summary": "RHBZ#1954225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954225" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3516", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3516" } ], "release_date": "2021-04-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:30:18+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only JBCS" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1390" }, { "category": "workaround", "details": "This flaw can be mitigated by not using xmllint with the --html and --push options together.", "product_ids": [ "Text-Only JBCS" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only JBCS" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Use-after-free in xmlEncodeEntitiesInternal() in entities.c" }, { "acknowledgments": [ { "names": [ "zodf0055980" ], "organization": "SQLab NCTU Taiwan" } ], "cve": "CVE-2021-3517", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-04-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1954232" } ], "notes": [ { "category": "description", "text": "There is a flaw in the xml entity encoding functionality of libxml2. An attacker who is able to supply a crafted file to be processed by an application linked with the affected functionality of libxml2 could trigger an out-of-bounds read. The most likely impact of this flaw is to application availability, with some potential impact to confidentiality and integrity if an attacker is able to use memory information to further exploit the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Heap-based buffer overflow in xmlEncodeEntitiesInternal() in entities.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is out of support scope for Red Hat Enterprise Linux 6 and 7. To learn more about Red Hat Enterprise Linux support life cycles, please see https://access.redhat.com/support/policy/updates/errata .", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only JBCS" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3517" }, { "category": "external", "summary": "RHBZ#1954232", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954232" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3517", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3517" } ], "release_date": "2021-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:30:18+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only JBCS" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1390" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "Text-Only JBCS" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Heap-based buffer overflow in xmlEncodeEntitiesInternal() in entities.c" }, { "acknowledgments": [ { "names": [ "zodf0055980" ], "organization": "SQLab NCTU Taiwan" } ], "cve": "CVE-2021-3518", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-04-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1954242" } ], "notes": [ { "category": "description", "text": "There\u0027s a flaw in libxml2. An attacker who is able to submit a crafted file to be processed by an application linked with libxml2 could trigger a use-after-free. The greatest impact from this flaw is to confidentiality, integrity, and availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Use-after-free in xmlXIncludeDoProcess() in xinclude.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is out of support scope for Red Hat Enterprise Linux 6 and 7. To learn more about Red Hat Enterprise Linux support life cycles, please see https://access.redhat.com/support/policy/updates/errata .", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only JBCS" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3518" }, { "category": "external", "summary": "RHBZ#1954242", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954242" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3518", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3518" } ], "release_date": "2021-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:30:18+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only JBCS" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1390" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "Text-Only JBCS" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Use-after-free in xmlXIncludeDoProcess() in xinclude.c" }, { "acknowledgments": [ { "names": [ "yuawn" ], "organization": "NSLab NTU Taiwan" } ], "cve": "CVE-2021-3537", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2021-05-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1956522" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in libxml2, where it did not propagate errors while parsing XML mixed content. This flaw causes the application to crash if an untrusted XML document is parsed in recovery mode and post validated. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: NULL pointer dereference when post-validating mixed content parsed in recovery mode", "title": "Vulnerability summary" }, { "category": "other", "text": "For the flaw to be exploitable, the document must be parsed in recovery mode and post validated (e.g.: when used in the `xmlling` tool, both `-recover` and `-postvalid` options must be used for the flaw to be exploitable)", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only JBCS" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3537" }, { "category": "external", "summary": "RHBZ#1956522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956522" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3537", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3537" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3537", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3537" } ], "release_date": "2021-05-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:30:18+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only JBCS" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1390" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Text-Only JBCS" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: NULL pointer dereference when post-validating mixed content parsed in recovery mode" }, { "acknowledgments": [ { "names": [ "Sebastian Pipping" ] } ], "cve": "CVE-2021-3541", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1950515" } ], "notes": [ { "category": "description", "text": "A flaw was found in libxml2. Exponential entity expansion attack its possible bypassing all existing protection mechanisms and leading to denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Exponential entity expansion attack bypasses all existing protection mechanisms", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only JBCS" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3541" }, { "category": "external", "summary": "RHBZ#1950515", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1950515" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3541", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3541" } ], "release_date": "2021-05-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:30:18+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only JBCS" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1390" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Text-Only JBCS" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Exponential entity expansion attack bypasses all existing protection mechanisms" }, { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2022-03-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2062202" } ], "notes": [ { "category": "description", "text": "A flaw was found in OpenSSL. It is possible to trigger an infinite loop by crafting a certificate that has invalid elliptic curve parameters. Since certificate parsing happens before verification of the certificate signature, any process that parses an externally supplied certificate may be subject to a denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates", "title": "Vulnerability summary" }, { "category": "other", "text": "While Red Hat initially stated not to be directly affected by this flaw, after further investigation we found that the versions of OpenSSL as shipped in Red Hat Enterprise Linux 6, 7, and 8 are vulnerable to a denial of service attack through malicious Elliptic Curve parameters. During processing of the parameters OpenSSL will call BN_mod_sqrt() with invalid arguments, causing the process to enter an infinite loop. The invalid EC parameters can be provided to OpenSSL through X.509 certificates (used in TLS connections), through public and private keys, through certificate signing requests and other places where applications process Elliptic Curve parameters. The flaw has been rated as having a security impact of Important. A future update will address this issue in Red Hat Enterprise Linux 6, 7 and 8.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only JBCS" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0778" }, { "category": "external", "summary": "RHBZ#2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0778", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0778" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20220315.txt", "url": "https://www.openssl.org/news/secadv/20220315.txt" } ], "release_date": "2022-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:30:18+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only JBCS" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1390" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "Text-Only JBCS" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Text-Only JBCS" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates" }, { "cve": "CVE-2022-22720", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064321" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd. The inbound connection is not closed when it fails to discard the request body, which may expose the server to HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only JBCS" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22720" }, { "category": "external", "summary": "RHBZ#2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:30:18+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only JBCS" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1390" }, { "category": "workaround", "details": "There are currently no known mitigations for this issue.", "product_ids": [ "Text-Only JBCS" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "Text-Only JBCS" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling" }, { "cve": "CVE-2022-23308", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-02-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2056913" } ], "notes": [ { "category": "description", "text": "A flaw was found in libxml2. A call to the xmlGetID function can return a pointer already freed when parsing an XML document with the XML_PARSE_DTDVALID option and without the XML_PARSE_NOENT option, resulting in a use-after-free issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Use-after-free of ID and IDREF attributes", "title": "Vulnerability summary" }, { "category": "other", "text": "The security impact of xmlGetID() returning a pointer to freed memory depends on the application and will mostly result in a denial of service (DoS). The typical use case of calling xmlGetID() on an unmodified document is not affected, therefore this issue was rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only JBCS" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23308" }, { "category": "external", "summary": "RHBZ#2056913", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056913" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23308", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23308" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23308", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23308" } ], "release_date": "2022-02-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:30:18+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only JBCS" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1390" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only JBCS" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Use-after-free of ID and IDREF attributes" } ] }
RHSA-2022:1136
Vulnerability from csaf_redhat
Published
2022-04-01 22:32
Modified
2025-02-28 01:33
Summary
Red Hat Security Advisory: httpd security update
Notes
Topic
An update for httpd is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update Support, and Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_lua: Possible buffer overflow when parsing multipart content (CVE-2021-44790)
* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for httpd is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update Support, and Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: mod_lua: Possible buffer overflow when parsing multipart content (CVE-2021-44790)\n\n* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1136", "url": "https://access.redhat.com/errata/RHSA-2022:1136" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2034674", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034674" }, { "category": "external", "summary": "2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1136.json" } ], "title": "Red Hat Security Advisory: httpd security update", "tracking": { "current_release_date": "2025-02-28T01:33:42+00:00", "generator": { "date": "2025-02-28T01:33:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.3.1" } }, "id": "RHSA-2022:1136", "initial_release_date": "2022-04-01T22:32:06+00:00", "revision_history": [ { "date": "2022-04-01T22:32:06+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-04-01T22:32:06+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-02-28T01:33:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 7.6)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server E4S (v. 7.6)", "product": { "name": "Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:7.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product": { "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:7.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server TUS (v. 7.6)", "product": { "name": "Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:7.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product": { "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:7.6::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-89.el7_6.4.src", "product": { "name": "httpd-0:2.4.6-89.el7_6.4.src", "product_id": "httpd-0:2.4.6-89.el7_6.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-89.el7_6.4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-89.el7_6.4.x86_64", "product": { "name": "httpd-0:2.4.6-89.el7_6.4.x86_64", "product_id": "httpd-0:2.4.6-89.el7_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-89.el7_6.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "product": { "name": "httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "product_id": "httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-89.el7_6.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "product": { "name": "httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "product_id": "httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-89.el7_6.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-89.el7_6.4.x86_64", "product": { "name": "mod_session-0:2.4.6-89.el7_6.4.x86_64", "product_id": "mod_session-0:2.4.6-89.el7_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-89.el7_6.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "product": { "name": "mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "product_id": "mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-89.el7_6.4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "product_id": "httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-89.el7_6.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "product": { "name": "mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "product_id": "mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-89.el7_6.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "product": { "name": "mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "product_id": "mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-89.el7_6.4?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-manual-0:2.4.6-89.el7_6.4.noarch", "product": { "name": "httpd-manual-0:2.4.6-89.el7_6.4.noarch", "product_id": "httpd-manual-0:2.4.6-89.el7_6.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-89.el7_6.4?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "product": { "name": "mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "product_id": "mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-89.el7_6.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "product_id": "mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-89.el7_6.4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "product_id": "httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-89.el7_6.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-0:2.4.6-89.el7_6.4.ppc64le", "product": { "name": "httpd-0:2.4.6-89.el7_6.4.ppc64le", "product_id": "httpd-0:2.4.6-89.el7_6.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-89.el7_6.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "product": { "name": "httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "product_id": "httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-89.el7_6.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "product": { "name": "httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "product_id": "httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-89.el7_6.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-89.el7_6.4.ppc64le", "product": { "name": "mod_session-0:2.4.6-89.el7_6.4.ppc64le", "product_id": "mod_session-0:2.4.6-89.el7_6.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-89.el7_6.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "product": { "name": "mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "product_id": "mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-89.el7_6.4?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-89.el7_6.4.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src" }, "product_reference": "httpd-0:2.4.6-89.el7_6.4.src", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-89.el7_6.4.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch" }, "product_reference": "httpd-manual-0:2.4.6-89.el7_6.4.noarch", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_session-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-89.el7_6.4.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le" }, "product_reference": "httpd-0:2.4.6-89.el7_6.4.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-89.el7_6.4.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src" }, "product_reference": "httpd-0:2.4.6-89.el7_6.4.src", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-89.el7_6.4.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le" }, "product_reference": "httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-89.el7_6.4.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch" }, "product_reference": "httpd-manual-0:2.4.6-89.el7_6.4.noarch", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-89.el7_6.4.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le" }, "product_reference": "httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-89.el7_6.4.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le" }, "product_reference": "mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-89.el7_6.4.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le" }, "product_reference": "mod_session-0:2.4.6-89.el7_6.4.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_session-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-89.el7_6.4.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le" }, "product_reference": "mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-89.el7_6.4.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src" }, "product_reference": "httpd-0:2.4.6-89.el7_6.4.src", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-89.el7_6.4.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch" }, "product_reference": "httpd-manual-0:2.4.6-89.el7_6.4.noarch", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_session-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-89.el7_6.4.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src" }, "product_reference": "httpd-0:2.4.6-89.el7_6.4.src", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-89.el7_6.4.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch" }, "product_reference": "httpd-manual-0:2.4.6-89.el7_6.4.noarch", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_session-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-89.el7_6.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le" }, "product_reference": "httpd-0:2.4.6-89.el7_6.4.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-89.el7_6.4.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src" }, "product_reference": "httpd-0:2.4.6-89.el7_6.4.src", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-89.el7_6.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le" }, "product_reference": "httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-89.el7_6.4.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch" }, "product_reference": "httpd-manual-0:2.4.6-89.el7_6.4.noarch", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-89.el7_6.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le" }, "product_reference": "httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-89.el7_6.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le" }, "product_reference": "mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-89.el7_6.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le" }, "product_reference": "mod_session-0:2.4.6-89.el7_6.4.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_session-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-89.el7_6.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le" }, "product_reference": "mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-89.el7_6.4.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src" }, "product_reference": "httpd-0:2.4.6-89.el7_6.4.src", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-89.el7_6.4.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch" }, "product_reference": "httpd-manual-0:2.4.6-89.el7_6.4.noarch", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_session-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.TUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-44790", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034674" } ], "notes": [ { "category": "description", "text": "A buffer overflow flaw in httpd\u0027s lua module could allow an out-of-bounds write. An attacker who is able to submit a crafted request to an httpd instance that is using the lua module may be able to cause an impact to confidentiality, integrity, and/or availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_lua: Possible buffer overflow when parsing multipart content", "title": "Vulnerability summary" }, { "category": "other", "text": "httpd as shipped in Red Hat Enterprise Linux 6 is NOT affected by this flaw because it does not ship mod_lua.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-44790" }, { "category": "external", "summary": "RHBZ#2034674", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034674" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44790", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44790" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44790", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44790" }, { "category": "external", "summary": "http://httpd.apache.org/security/vulnerabilities_24.html", "url": "http://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-01T22:32:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1136" }, { "category": "workaround", "details": "Disabling mod_lua and restarting httpd will mitigate this flaw. See https://access.redhat.com/articles/10649 for more information.", "product_ids": [ "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: mod_lua: Possible buffer overflow when parsing multipart content" }, { "cve": "CVE-2022-22720", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064321" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd. The inbound connection is not closed when it fails to discard the request body, which may expose the server to HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22720" }, { "category": "external", "summary": "RHBZ#2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-01T22:32:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1136" }, { "category": "workaround", "details": "There are currently no known mitigations for this issue.", "product_ids": [ "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling" } ] }
rhsa-2022:1102
Vulnerability from csaf_redhat
Published
2022-03-29 09:20
Modified
2025-02-28 01:30
Summary
Red Hat Security Advisory: httpd:2.4 security update
Notes
Topic
An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1102", "url": "https://access.redhat.com/errata/RHSA-2022:1102" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1102.json" } ], "title": "Red Hat Security Advisory: httpd:2.4 security update", "tracking": { "current_release_date": "2025-02-28T01:30:13+00:00", "generator": { "date": "2025-02-28T01:30:13+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.3.1" } }, "id": "RHSA-2022:1102", "initial_release_date": "2022-03-29T09:20:09+00:00", "revision_history": [ { "date": "2022-03-29T09:20:09+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-03-29T09:20:09+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-02-28T01:30:13+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.2::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd:2.4:8020020220321171949:4cda2c84", "product": { "name": "httpd:2.4:8020020220321171949:4cda2c84", "product_id": "httpd:2.4:8020020220321171949:4cda2c84", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/httpd@2.4:8020020220321171949:4cda2c84" } } }, { "category": "product_version", "name": "httpd-filesystem-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch", "product": { "name": "httpd-filesystem-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch", "product_id": "httpd-filesystem-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=noarch" } } }, { "category": "product_version", "name": "httpd-manual-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch", "product": { "name": "httpd-manual-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch", "product_id": "httpd-manual-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product": { "name": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_id": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product": { "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_id": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product": { "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_id": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product": { "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_id": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product": { "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_id": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_id": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "product": { "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "product_id": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "product": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "product_id": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "product": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "product_id": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product": { "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_id": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_id": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "product": { "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "product_id": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "product": { "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "product_id": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "product": { "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "product_id": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product": { "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_id": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product": { "name": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_id": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product": { "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_id": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product": { "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_id": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_id": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.src", "product": { "name": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.src", "product_id": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=src" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src", "product": { "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src", "product_id": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=src" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "product": { "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "product_id": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product": { "name": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_id": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_id": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product": { "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_id": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product": { "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_id": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product": { "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_id": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_id": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "product": { "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "product_id": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "product": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "product_id": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "product": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "product_id": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product": { "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_id": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_id": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "product": { "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "product_id": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "product": { "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "product_id": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "product": { "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "product_id": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_id": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product": { "name": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_id": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product": { "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_id": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product": { "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_id": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_id": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product": { "name": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_id": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product": { "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_id": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product": { "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_id": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product": { "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_id": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product": { "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_id": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_id": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "product": { "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "product_id": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "product": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "product_id": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "product": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "product_id": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product": { "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_id": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_id": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=s390x" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "product": { "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "product_id": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "product": { "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "product_id": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "product": { "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "product_id": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product": { "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_id": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product": { "name": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_id": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=s390x" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product": { "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_id": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product": { "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_id": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_id": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product": { "name": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_id": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_id": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product": { "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_id": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product": { "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_id": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product": { "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_id": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_id": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "product": { "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "product_id": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "product": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "product_id": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "product": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "product_id": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product": { "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_id": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_id": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product": { "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product_id": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product": { "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product_id": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product": { "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product_id": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product": { "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_id": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product": { "name": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_id": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product": { "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_id": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product": { "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_id": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_id": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, "product_reference": "httpd:2.4:8020020220321171949:4cda2c84", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64" }, "product_reference": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le" }, "product_reference": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x" }, "product_reference": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.src as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.src" }, "product_reference": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.src", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" }, "product_reference": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64" }, "product_reference": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64" }, "product_reference": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le" }, "product_reference": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x" }, "product_reference": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64" }, "product_reference": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le" }, "product_reference": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x" }, "product_reference": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch" }, "product_reference": "httpd-manual-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64" }, "product_reference": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le" }, "product_reference": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x" }, "product_reference": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64" }, "product_reference": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le" }, "product_reference": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x" }, "product_reference": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src" }, "product_reference": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64" }, "product_reference": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64" }, "product_reference": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le" }, "product_reference": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x" }, "product_reference": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64" }, "product_reference": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le" }, "product_reference": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x" }, "product_reference": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64" }, "product_reference": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le" }, "product_reference": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x" }, "product_reference": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64" }, "product_reference": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le" }, "product_reference": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x" }, "product_reference": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src" }, "product_reference": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64" }, "product_reference": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le" }, "product_reference": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x" }, "product_reference": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64" }, "product_reference": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le" }, "product_reference": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x" }, "product_reference": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64" }, "product_reference": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64" }, "product_reference": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x" }, "product_reference": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64" }, "product_reference": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le" }, "product_reference": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x" }, "product_reference": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" }, "product_reference": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le" }, "product_reference": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x" }, "product_reference": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64" }, "product_reference": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le" }, "product_reference": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x" }, "product_reference": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-22720", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064321" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd. The inbound connection is not closed when it fails to discard the request body, which may expose the server to HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.src", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22720" }, { "category": "external", "summary": "RHBZ#2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-29T09:20:09+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.src", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1102" }, { "category": "workaround", "details": "There are currently no known mitigations for this issue.", "product_ids": [ "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.src", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.src", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling" } ] }
RHSA-2022:1049
Vulnerability from csaf_redhat
Published
2022-03-24 11:24
Modified
2025-05-19 17:31
Summary
Red Hat Security Advisory: httpd:2.4 security update
Notes
Topic
An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1049", "url": "https://access.redhat.com/errata/RHSA-2022:1049" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1049.json" } ], "title": "Red Hat Security Advisory: httpd:2.4 security update", "tracking": { "current_release_date": "2025-05-19T17:31:14+00:00", "generator": { "date": "2025-05-19T17:31:14+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.5.1" } }, "id": "RHSA-2022:1049", "initial_release_date": "2022-03-24T11:24:58+00:00", "revision_history": [ { "date": "2022-03-24T11:24:58+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-03-24T11:24:58+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-05-19T17:31:14+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd:2.4:8050020220321170448:c5368500", "product": { "name": "httpd:2.4:8050020220321170448:c5368500", "product_id": "httpd:2.4:8050020220321170448:c5368500", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/httpd@2.4:8050020220321170448:c5368500" } } }, { "category": "product_version", "name": "httpd-filesystem-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch", "product": { "name": "httpd-filesystem-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch", "product_id": "httpd-filesystem-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=noarch" } } }, { "category": "product_version", "name": "httpd-manual-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch", "product": { "name": "httpd-manual-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch", "product_id": "httpd-manual-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product": { "name": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_id": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product": { "name": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_id": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product": { "name": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_id": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product": { "name": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_id": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product": { "name": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_id": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_id": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product_id": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product_id": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product_id": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product": { "name": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_id": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_id": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=aarch64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product": { "name": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_id": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product": { "name": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_id": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=aarch64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product": { "name": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_id": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product": { "name": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_id": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_id": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.src", "product": { "name": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.src", "product_id": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=src" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src", "product": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src", "product_id": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=src" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product": { "name": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_id": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_id": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product": { "name": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_id": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product": { "name": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_id": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product": { "name": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_id": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_id": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product_id": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product_id": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product_id": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product": { "name": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_id": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_id": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_id": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product": { "name": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_id": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product": { "name": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_id": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product": { "name": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_id": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_id": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product": { "name": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_id": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product": { "name": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_id": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product": { "name": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_id": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product": { "name": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_id": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product": { "name": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_id": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_id": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product_id": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product_id": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product_id": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product": { "name": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_id": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_id": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=s390x" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product": { "name": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_id": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product": { "name": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_id": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=s390x" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product": { "name": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_id": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product": { "name": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_id": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_id": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product": { "name": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_id": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_id": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product": { "name": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_id": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product": { "name": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_id": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product": { "name": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_id": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_id": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product_id": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product_id": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product_id": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product": { "name": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_id": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_id": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product": { "name": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_id": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product": { "name": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_id": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product": { "name": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_id": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product": { "name": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_id": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_id": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, "product_reference": "httpd:2.4:8050020220321170448:c5368500", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64" }, "product_reference": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le" }, "product_reference": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x" }, "product_reference": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.src as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.src" }, "product_reference": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.src", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" }, "product_reference": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64" }, "product_reference": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64" }, "product_reference": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le" }, "product_reference": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x" }, "product_reference": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64" }, "product_reference": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le" }, "product_reference": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x" }, "product_reference": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-filesystem-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-manual-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch" }, "product_reference": "httpd-manual-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64" }, "product_reference": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le" }, "product_reference": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x" }, "product_reference": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le" }, "product_reference": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x" }, "product_reference": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64" }, "product_reference": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le" }, "product_reference": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x" }, "product_reference": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64" }, "product_reference": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x" }, "product_reference": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64" }, "product_reference": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le" }, "product_reference": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x" }, "product_reference": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" }, "product_reference": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le" }, "product_reference": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x" }, "product_reference": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64" }, "product_reference": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le" }, "product_reference": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x" }, "product_reference": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-22720", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064321" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd. The inbound connection is not closed when it fails to discard the request body, which may expose the server to HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.src", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-filesystem-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-manual-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22720" }, { "category": "external", "summary": "RHBZ#2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-24T11:24:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.src", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-filesystem-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-manual-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1049" }, { "category": "workaround", "details": "There are currently no known mitigations for this issue.", "product_ids": [ "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.src", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-filesystem-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-manual-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.src", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-filesystem-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-manual-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling" } ] }
rhsa-2022:1072
Vulnerability from csaf_redhat
Published
2022-03-28 10:39
Modified
2025-02-28 01:29
Summary
Red Hat Security Advisory: httpd:2.4 security update
Notes
Topic
An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1072", "url": "https://access.redhat.com/errata/RHSA-2022:1072" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1072.json" } ], "title": "Red Hat Security Advisory: httpd:2.4 security update", "tracking": { "current_release_date": "2025-02-28T01:29:50+00:00", "generator": { "date": "2025-02-28T01:29:50+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.3.1" } }, "id": "RHSA-2022:1072", "initial_release_date": "2022-03-28T10:39:35+00:00", "revision_history": [ { "date": "2022-03-28T10:39:35+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-03-28T10:39:35+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-02-28T01:29:50+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.4::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd:2.4:8040020220321171351:522a0ee4", "product": { "name": "httpd:2.4:8040020220321171351:522a0ee4", "product_id": "httpd:2.4:8040020220321171351:522a0ee4", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/httpd@2.4:8040020220321171351:522a0ee4" } } }, { "category": "product_version", "name": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch", "product": { "name": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch", "product_id": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=noarch" } } }, { "category": "product_version", "name": "httpd-manual-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch", "product": { "name": "httpd-manual-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch", "product_id": "httpd-manual-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product": { "name": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_id": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product": { "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_id": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product": { "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_id": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product": { "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_id": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product": { "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_id": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_id": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product_id": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product_id": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product_id": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product": { "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_id": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_id": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product": { "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_id": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product": { "name": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_id": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product": { "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_id": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product": { "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_id": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_id": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.src", "product": { "name": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.src", "product_id": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=src" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src", "product": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src", "product_id": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=src" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product": { "name": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_id": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_id": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product": { "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_id": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product": { "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_id": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product": { "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_id": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_id": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product_id": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product_id": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product_id": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product": { "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_id": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_id": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_id": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product": { "name": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_id": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product": { "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_id": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product": { "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_id": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_id": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product": { "name": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_id": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product": { "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_id": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product": { "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_id": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product": { "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_id": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product": { "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_id": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_id": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product_id": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product_id": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product_id": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product": { "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_id": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_id": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=s390x" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product": { "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_id": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product": { "name": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_id": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=s390x" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product": { "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_id": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product": { "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_id": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_id": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product": { "name": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_id": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_id": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product": { "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_id": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product": { "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_id": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product": { "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_id": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_id": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product_id": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product_id": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product_id": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product": { "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_id": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_id": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product": { "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_id": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product": { "name": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_id": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product": { "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_id": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product": { "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_id": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_id": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, "product_reference": "httpd:2.4:8040020220321171351:522a0ee4", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64" }, "product_reference": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le" }, "product_reference": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x" }, "product_reference": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.src as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.src" }, "product_reference": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.src", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" }, "product_reference": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64" }, "product_reference": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64" }, "product_reference": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le" }, "product_reference": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x" }, "product_reference": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64" }, "product_reference": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le" }, "product_reference": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x" }, "product_reference": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch" }, "product_reference": "httpd-manual-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64" }, "product_reference": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le" }, "product_reference": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x" }, "product_reference": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le" }, "product_reference": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x" }, "product_reference": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64" }, "product_reference": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le" }, "product_reference": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x" }, "product_reference": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64" }, "product_reference": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x" }, "product_reference": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64" }, "product_reference": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le" }, "product_reference": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x" }, "product_reference": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" }, "product_reference": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le" }, "product_reference": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x" }, "product_reference": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64" }, "product_reference": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le" }, "product_reference": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x" }, "product_reference": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-22720", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064321" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd. The inbound connection is not closed when it fails to discard the request body, which may expose the server to HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.src", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22720" }, { "category": "external", "summary": "RHBZ#2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-28T10:39:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.src", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1072" }, { "category": "workaround", "details": "There are currently no known mitigations for this issue.", "product_ids": [ "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.src", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.src", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling" } ] }
rhsa-2022:1075
Vulnerability from csaf_redhat
Published
2022-03-28 10:15
Modified
2025-03-19 16:06
Summary
Red Hat Security Advisory: httpd24-httpd security update
Notes
Topic
An update for httpd24-httpd is now available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for httpd24-httpd is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1075", "url": "https://access.redhat.com/errata/RHSA-2022:1075" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1075.json" } ], "title": "Red Hat Security Advisory: httpd24-httpd security update", "tracking": { "current_release_date": "2025-03-19T16:06:35+00:00", "generator": { "date": "2025-03-19T16:06:35+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2022:1075", "initial_release_date": "2022-03-28T10:15:14+00:00", "revision_history": [ { "date": "2022-03-28T10:15:14+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-03-28T10:15:14+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-19T16:06:35+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Software Collections for RHEL Workstation(v. 7)", "product": { "name": "Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for RHEL(v. 7)", "product": { "name": "Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } } ], "category": "product_family", "name": "Red Hat Software Collections" }, { "branches": [ { "category": "product_version", "name": "httpd24-httpd-0:2.4.34-23.el7.2.src", "product": { "name": "httpd24-httpd-0:2.4.34-23.el7.2.src", "product_id": "httpd24-httpd-0:2.4.34-23.el7.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.34-23.el7.2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd24-httpd-0:2.4.34-23.el7.2.x86_64", "product": { "name": "httpd24-httpd-0:2.4.34-23.el7.2.x86_64", "product_id": "httpd24-httpd-0:2.4.34-23.el7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.34-23.el7.2?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-httpd-devel-0:2.4.34-23.el7.2.x86_64", "product": { "name": "httpd24-httpd-devel-0:2.4.34-23.el7.2.x86_64", "product_id": "httpd24-httpd-devel-0:2.4.34-23.el7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-devel@2.4.34-23.el7.2?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-httpd-tools-0:2.4.34-23.el7.2.x86_64", "product": { "name": "httpd24-httpd-tools-0:2.4.34-23.el7.2.x86_64", "product_id": "httpd24-httpd-tools-0:2.4.34-23.el7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-tools@2.4.34-23.el7.2?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-mod_ldap-0:2.4.34-23.el7.2.x86_64", "product": { "name": "httpd24-mod_ldap-0:2.4.34-23.el7.2.x86_64", "product_id": "httpd24-mod_ldap-0:2.4.34-23.el7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_ldap@2.4.34-23.el7.2?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.x86_64", "product": { "name": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.x86_64", "product_id": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.34-23.el7.2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd24-mod_session-0:2.4.34-23.el7.2.x86_64", "product": { "name": "httpd24-mod_session-0:2.4.34-23.el7.2.x86_64", "product_id": "httpd24-mod_session-0:2.4.34-23.el7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_session@2.4.34-23.el7.2?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-mod_ssl-1:2.4.34-23.el7.2.x86_64", "product": { "name": "httpd24-mod_ssl-1:2.4.34-23.el7.2.x86_64", "product_id": "httpd24-mod_ssl-1:2.4.34-23.el7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_ssl@2.4.34-23.el7.2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.x86_64", "product": { "name": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.x86_64", "product_id": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.34-23.el7.2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd24-httpd-manual-0:2.4.34-23.el7.2.noarch", "product": { "name": "httpd24-httpd-manual-0:2.4.34-23.el7.2.noarch", "product_id": "httpd24-httpd-manual-0:2.4.34-23.el7.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-manual@2.4.34-23.el7.2?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd24-httpd-0:2.4.34-23.el7.2.s390x", "product": { "name": "httpd24-httpd-0:2.4.34-23.el7.2.s390x", "product_id": "httpd24-httpd-0:2.4.34-23.el7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.34-23.el7.2?arch=s390x" } } }, { "category": "product_version", "name": "httpd24-httpd-devel-0:2.4.34-23.el7.2.s390x", "product": { "name": "httpd24-httpd-devel-0:2.4.34-23.el7.2.s390x", "product_id": "httpd24-httpd-devel-0:2.4.34-23.el7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-devel@2.4.34-23.el7.2?arch=s390x" } } }, { "category": "product_version", "name": "httpd24-httpd-tools-0:2.4.34-23.el7.2.s390x", "product": { "name": "httpd24-httpd-tools-0:2.4.34-23.el7.2.s390x", "product_id": "httpd24-httpd-tools-0:2.4.34-23.el7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-tools@2.4.34-23.el7.2?arch=s390x" } } }, { "category": "product_version", "name": "httpd24-mod_ldap-0:2.4.34-23.el7.2.s390x", "product": { "name": "httpd24-mod_ldap-0:2.4.34-23.el7.2.s390x", "product_id": "httpd24-mod_ldap-0:2.4.34-23.el7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_ldap@2.4.34-23.el7.2?arch=s390x" } } }, { "category": "product_version", "name": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.s390x", "product": { "name": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.s390x", "product_id": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.34-23.el7.2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd24-mod_session-0:2.4.34-23.el7.2.s390x", "product": { "name": "httpd24-mod_session-0:2.4.34-23.el7.2.s390x", "product_id": "httpd24-mod_session-0:2.4.34-23.el7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_session@2.4.34-23.el7.2?arch=s390x" } } }, { "category": "product_version", "name": "httpd24-mod_ssl-1:2.4.34-23.el7.2.s390x", "product": { "name": "httpd24-mod_ssl-1:2.4.34-23.el7.2.s390x", "product_id": "httpd24-mod_ssl-1:2.4.34-23.el7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_ssl@2.4.34-23.el7.2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.s390x", "product": { "name": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.s390x", "product_id": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.34-23.el7.2?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd24-httpd-0:2.4.34-23.el7.2.ppc64le", "product": { "name": "httpd24-httpd-0:2.4.34-23.el7.2.ppc64le", "product_id": "httpd24-httpd-0:2.4.34-23.el7.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.34-23.el7.2?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd24-httpd-devel-0:2.4.34-23.el7.2.ppc64le", "product": { "name": "httpd24-httpd-devel-0:2.4.34-23.el7.2.ppc64le", "product_id": "httpd24-httpd-devel-0:2.4.34-23.el7.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-devel@2.4.34-23.el7.2?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd24-httpd-tools-0:2.4.34-23.el7.2.ppc64le", "product": { "name": "httpd24-httpd-tools-0:2.4.34-23.el7.2.ppc64le", "product_id": "httpd24-httpd-tools-0:2.4.34-23.el7.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-tools@2.4.34-23.el7.2?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd24-mod_ldap-0:2.4.34-23.el7.2.ppc64le", "product": { "name": "httpd24-mod_ldap-0:2.4.34-23.el7.2.ppc64le", "product_id": "httpd24-mod_ldap-0:2.4.34-23.el7.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_ldap@2.4.34-23.el7.2?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.ppc64le", "product": { "name": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.ppc64le", "product_id": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.34-23.el7.2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd24-mod_session-0:2.4.34-23.el7.2.ppc64le", "product": { "name": "httpd24-mod_session-0:2.4.34-23.el7.2.ppc64le", "product_id": "httpd24-mod_session-0:2.4.34-23.el7.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_session@2.4.34-23.el7.2?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd24-mod_ssl-1:2.4.34-23.el7.2.ppc64le", "product": { "name": "httpd24-mod_ssl-1:2.4.34-23.el7.2.ppc64le", "product_id": "httpd24-mod_ssl-1:2.4.34-23.el7.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_ssl@2.4.34-23.el7.2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.ppc64le", "product": { "name": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.ppc64le", "product_id": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.34-23.el7.2?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-23.el7.2.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.ppc64le" }, "product_reference": "httpd24-httpd-0:2.4.34-23.el7.2.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-23.el7.2.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.s390x" }, "product_reference": "httpd24-httpd-0:2.4.34-23.el7.2.s390x", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-23.el7.2.src as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.src" }, "product_reference": "httpd24-httpd-0:2.4.34-23.el7.2.src", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-23.el7.2.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.x86_64" }, "product_reference": "httpd24-httpd-0:2.4.34-23.el7.2.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.ppc64le" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.s390x" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.s390x", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.x86_64" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.34-23.el7.2.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.ppc64le" }, "product_reference": "httpd24-httpd-devel-0:2.4.34-23.el7.2.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.34-23.el7.2.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.s390x" }, "product_reference": "httpd24-httpd-devel-0:2.4.34-23.el7.2.s390x", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.34-23.el7.2.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.x86_64" }, "product_reference": "httpd24-httpd-devel-0:2.4.34-23.el7.2.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-manual-0:2.4.34-23.el7.2.noarch as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.2.noarch" }, "product_reference": "httpd24-httpd-manual-0:2.4.34-23.el7.2.noarch", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.34-23.el7.2.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.ppc64le" }, "product_reference": "httpd24-httpd-tools-0:2.4.34-23.el7.2.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.34-23.el7.2.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.s390x" }, "product_reference": "httpd24-httpd-tools-0:2.4.34-23.el7.2.s390x", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.34-23.el7.2.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.x86_64" }, "product_reference": "httpd24-httpd-tools-0:2.4.34-23.el7.2.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.34-23.el7.2.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.ppc64le" }, "product_reference": "httpd24-mod_ldap-0:2.4.34-23.el7.2.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.34-23.el7.2.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.s390x" }, "product_reference": "httpd24-mod_ldap-0:2.4.34-23.el7.2.s390x", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.34-23.el7.2.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.x86_64" }, "product_reference": "httpd24-mod_ldap-0:2.4.34-23.el7.2.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.ppc64le" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.s390x" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.s390x", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.x86_64" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.34-23.el7.2.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.ppc64le" }, "product_reference": "httpd24-mod_session-0:2.4.34-23.el7.2.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.34-23.el7.2.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.s390x" }, "product_reference": "httpd24-mod_session-0:2.4.34-23.el7.2.s390x", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.34-23.el7.2.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.x86_64" }, "product_reference": "httpd24-mod_session-0:2.4.34-23.el7.2.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.34-23.el7.2.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.ppc64le" }, "product_reference": "httpd24-mod_ssl-1:2.4.34-23.el7.2.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.34-23.el7.2.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.s390x" }, "product_reference": "httpd24-mod_ssl-1:2.4.34-23.el7.2.s390x", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.34-23.el7.2.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.x86_64" }, "product_reference": "httpd24-mod_ssl-1:2.4.34-23.el7.2.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-23.el7.2.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.ppc64le" }, "product_reference": "httpd24-httpd-0:2.4.34-23.el7.2.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-23.el7.2.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.s390x" }, "product_reference": "httpd24-httpd-0:2.4.34-23.el7.2.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-23.el7.2.src as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.src" }, "product_reference": "httpd24-httpd-0:2.4.34-23.el7.2.src", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-23.el7.2.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.x86_64" }, "product_reference": "httpd24-httpd-0:2.4.34-23.el7.2.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.ppc64le" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.s390x" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.x86_64" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.34-23.el7.2.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.ppc64le" }, "product_reference": "httpd24-httpd-devel-0:2.4.34-23.el7.2.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.34-23.el7.2.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.s390x" }, "product_reference": "httpd24-httpd-devel-0:2.4.34-23.el7.2.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.34-23.el7.2.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.x86_64" }, "product_reference": "httpd24-httpd-devel-0:2.4.34-23.el7.2.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-manual-0:2.4.34-23.el7.2.noarch as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.2.noarch" }, "product_reference": "httpd24-httpd-manual-0:2.4.34-23.el7.2.noarch", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.34-23.el7.2.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.ppc64le" }, "product_reference": "httpd24-httpd-tools-0:2.4.34-23.el7.2.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.34-23.el7.2.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.s390x" }, "product_reference": "httpd24-httpd-tools-0:2.4.34-23.el7.2.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.34-23.el7.2.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.x86_64" }, "product_reference": "httpd24-httpd-tools-0:2.4.34-23.el7.2.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.34-23.el7.2.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.ppc64le" }, "product_reference": "httpd24-mod_ldap-0:2.4.34-23.el7.2.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.34-23.el7.2.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.s390x" }, "product_reference": "httpd24-mod_ldap-0:2.4.34-23.el7.2.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.34-23.el7.2.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.x86_64" }, "product_reference": "httpd24-mod_ldap-0:2.4.34-23.el7.2.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.ppc64le" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.s390x" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.x86_64" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.34-23.el7.2.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.ppc64le" }, "product_reference": "httpd24-mod_session-0:2.4.34-23.el7.2.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.34-23.el7.2.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.s390x" }, "product_reference": "httpd24-mod_session-0:2.4.34-23.el7.2.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.34-23.el7.2.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.x86_64" }, "product_reference": "httpd24-mod_session-0:2.4.34-23.el7.2.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.34-23.el7.2.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.ppc64le" }, "product_reference": "httpd24-mod_ssl-1:2.4.34-23.el7.2.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.34-23.el7.2.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.s390x" }, "product_reference": "httpd24-mod_ssl-1:2.4.34-23.el7.2.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.34-23.el7.2.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.x86_64" }, "product_reference": "httpd24-mod_ssl-1:2.4.34-23.el7.2.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.8" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-22720", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064321" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd. The inbound connection is not closed when it fails to discard the request body, which may expose the server to HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.2.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.2.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22720" }, { "category": "external", "summary": "RHBZ#2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-28T10:15:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.2.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.2.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1075" }, { "category": "workaround", "details": "There are currently no known mitigations for this issue.", "product_ids": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.2.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.2.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.2.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.2.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling" } ] }
rhsa-2022_1137
Vulnerability from csaf_redhat
Published
2022-04-01 22:26
Modified
2024-11-15 14:46
Summary
Red Hat Security Advisory: httpd security update
Notes
Topic
An update for httpd is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_lua: Possible buffer overflow when parsing multipart content (CVE-2021-44790)
* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for httpd is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: mod_lua: Possible buffer overflow when parsing multipart content (CVE-2021-44790)\n\n* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1137", "url": "https://access.redhat.com/errata/RHSA-2022:1137" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2034674", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034674" }, { "category": "external", "summary": "2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1137.json" } ], "title": "Red Hat Security Advisory: httpd security update", "tracking": { "current_release_date": "2024-11-15T14:46:24+00:00", "generator": { "date": "2024-11-15T14:46:24+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:1137", "initial_release_date": "2022-04-01T22:26:41+00:00", "revision_history": [ { "date": "2022-04-01T22:26:41+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-04-01T22:26:41+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T14:46:24+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:7.7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server E4S (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:7.7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server TUS (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:7.7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:7.7::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-90.el7_7.3.src", "product": { "name": "httpd-0:2.4.6-90.el7_7.3.src", "product_id": "httpd-0:2.4.6-90.el7_7.3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-90.el7_7.3?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-90.el7_7.3.x86_64", "product": { "name": "httpd-0:2.4.6-90.el7_7.3.x86_64", "product_id": "httpd-0:2.4.6-90.el7_7.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-90.el7_7.3?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "product": { "name": "httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "product_id": "httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-90.el7_7.3?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "product": { "name": "httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "product_id": "httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-90.el7_7.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-90.el7_7.3.x86_64", "product": { "name": "mod_session-0:2.4.6-90.el7_7.3.x86_64", "product_id": "mod_session-0:2.4.6-90.el7_7.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-90.el7_7.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "product": { "name": "mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "product_id": "mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-90.el7_7.3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "product_id": "httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-90.el7_7.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "product": { "name": "mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "product_id": "mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-90.el7_7.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "product": { "name": "mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "product_id": "mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-90.el7_7.3?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-manual-0:2.4.6-90.el7_7.3.noarch", "product": { "name": "httpd-manual-0:2.4.6-90.el7_7.3.noarch", "product_id": "httpd-manual-0:2.4.6-90.el7_7.3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-90.el7_7.3?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-90.el7_7.3.ppc64le", "product": { "name": "httpd-0:2.4.6-90.el7_7.3.ppc64le", "product_id": "httpd-0:2.4.6-90.el7_7.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-90.el7_7.3?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "product": { "name": "httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "product_id": "httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-90.el7_7.3?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "product": { "name": "httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "product_id": "httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-90.el7_7.3?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-90.el7_7.3.ppc64le", "product": { "name": "mod_session-0:2.4.6-90.el7_7.3.ppc64le", "product_id": "mod_session-0:2.4.6-90.el7_7.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-90.el7_7.3?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "product": { "name": "mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "product_id": "mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-90.el7_7.3?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "product_id": "httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-90.el7_7.3?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "product": { "name": "mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "product_id": "mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-90.el7_7.3?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "product_id": "mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-90.el7_7.3?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.3.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src" }, "product_reference": "httpd-0:2.4.6-90.el7_7.3.src", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-90.el7_7.3.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch" }, "product_reference": "httpd-manual-0:2.4.6-90.el7_7.3.noarch", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_session-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.3.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le" }, "product_reference": "httpd-0:2.4.6-90.el7_7.3.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.3.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src" }, "product_reference": "httpd-0:2.4.6-90.el7_7.3.src", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-90.el7_7.3.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le" }, "product_reference": "httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-90.el7_7.3.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch" }, "product_reference": "httpd-manual-0:2.4.6-90.el7_7.3.noarch", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-90.el7_7.3.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le" }, "product_reference": "httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-90.el7_7.3.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le" }, "product_reference": "mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-90.el7_7.3.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le" }, "product_reference": "mod_session-0:2.4.6-90.el7_7.3.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_session-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-90.el7_7.3.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le" }, "product_reference": "mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)", "product_id": "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.3.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src" }, "product_reference": "httpd-0:2.4.6-90.el7_7.3.src", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-90.el7_7.3.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch" }, "product_reference": "httpd-manual-0:2.4.6-90.el7_7.3.noarch", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_session-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)", "product_id": "7Server-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.3.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src" }, "product_reference": "httpd-0:2.4.6-90.el7_7.3.src", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-90.el7_7.3.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch" }, "product_reference": "httpd-manual-0:2.4.6-90.el7_7.3.noarch", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_session-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.3.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le" }, "product_reference": "httpd-0:2.4.6-90.el7_7.3.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.3.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src" }, "product_reference": "httpd-0:2.4.6-90.el7_7.3.src", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-90.el7_7.3.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le" }, "product_reference": "httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-90.el7_7.3.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch" }, "product_reference": "httpd-manual-0:2.4.6-90.el7_7.3.noarch", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-90.el7_7.3.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le" }, "product_reference": "httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-90.el7_7.3.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le" }, "product_reference": "mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-90.el7_7.3.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le" }, "product_reference": "mod_session-0:2.4.6-90.el7_7.3.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_session-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-90.el7_7.3.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le" }, "product_reference": "mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)", "product_id": "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.3.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src" }, "product_reference": "httpd-0:2.4.6-90.el7_7.3.src", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-90.el7_7.3.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch" }, "product_reference": "httpd-manual-0:2.4.6-90.el7_7.3.noarch", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_session-0:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-90.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)", "product_id": "7Server-optional-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.TUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-44790", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034674" } ], "notes": [ { "category": "description", "text": "A buffer overflow flaw in httpd\u0027s lua module could allow an out-of-bounds write. An attacker who is able to submit a crafted request to an httpd instance that is using the lua module may be able to cause an impact to confidentiality, integrity, and/or availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_lua: Possible buffer overflow when parsing multipart content", "title": "Vulnerability summary" }, { "category": "other", "text": "httpd as shipped in Red Hat Enterprise Linux 6 is NOT affected by this flaw because it does not ship mod_lua.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-44790" }, { "category": "external", "summary": "RHBZ#2034674", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034674" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44790", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44790" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44790", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44790" }, { "category": "external", "summary": "http://httpd.apache.org/security/vulnerabilities_24.html", "url": "http://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-01T22:26:41+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1137" }, { "category": "workaround", "details": "Disabling mod_lua and restarting httpd will mitigate this flaw. See https://access.redhat.com/articles/10649 for more information.", "product_ids": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: mod_lua: Possible buffer overflow when parsing multipart content" }, { "cve": "CVE-2022-22720", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064321" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd. The inbound connection is not closed when it fails to discard the request body, which may expose the server to HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22720" }, { "category": "external", "summary": "RHBZ#2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-01T22:26:41+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1137" }, { "category": "workaround", "details": "There are currently no known mitigations for this issue.", "product_ids": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "7Server-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.E4S:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.ppc64le", "7Server-optional-7.7.E4S:mod_ssl-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.src", "7Server-optional-7.7.TUS:httpd-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-debuginfo-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-devel-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:httpd-manual-0:2.4.6-90.el7_7.3.noarch", "7Server-optional-7.7.TUS:httpd-tools-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_ldap-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_proxy_html-1:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_session-0:2.4.6-90.el7_7.3.x86_64", "7Server-optional-7.7.TUS:mod_ssl-1:2.4.6-90.el7_7.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling" } ] }
RHSA-2022:1102
Vulnerability from csaf_redhat
Published
2022-03-29 09:20
Modified
2025-02-28 01:30
Summary
Red Hat Security Advisory: httpd:2.4 security update
Notes
Topic
An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1102", "url": "https://access.redhat.com/errata/RHSA-2022:1102" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1102.json" } ], "title": "Red Hat Security Advisory: httpd:2.4 security update", "tracking": { "current_release_date": "2025-02-28T01:30:13+00:00", "generator": { "date": "2025-02-28T01:30:13+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.3.1" } }, "id": "RHSA-2022:1102", "initial_release_date": "2022-03-29T09:20:09+00:00", "revision_history": [ { "date": "2022-03-29T09:20:09+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-03-29T09:20:09+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-02-28T01:30:13+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.2::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd:2.4:8020020220321171949:4cda2c84", "product": { "name": "httpd:2.4:8020020220321171949:4cda2c84", "product_id": "httpd:2.4:8020020220321171949:4cda2c84", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/httpd@2.4:8020020220321171949:4cda2c84" } } }, { "category": "product_version", "name": "httpd-filesystem-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch", "product": { "name": "httpd-filesystem-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch", "product_id": "httpd-filesystem-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=noarch" } } }, { "category": "product_version", "name": "httpd-manual-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch", "product": { "name": "httpd-manual-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch", "product_id": "httpd-manual-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product": { "name": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_id": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product": { "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_id": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product": { "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_id": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product": { "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_id": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product": { "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_id": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_id": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "product": { "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "product_id": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "product": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "product_id": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "product": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "product_id": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product": { "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_id": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_id": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "product": { "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "product_id": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "product": { "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "product_id": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "product": { "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "product_id": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product": { "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_id": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product": { "name": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_id": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product": { "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_id": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product": { "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_id": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_id": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.src", "product": { "name": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.src", "product_id": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=src" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src", "product": { "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src", "product_id": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=src" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "product": { "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "product_id": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product": { "name": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_id": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_id": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product": { "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_id": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product": { "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_id": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product": { "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_id": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_id": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "product": { "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "product_id": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "product": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "product_id": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "product": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "product_id": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product": { "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_id": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_id": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "product": { "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "product_id": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "product": { "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "product_id": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "product": { "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "product_id": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_id": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product": { "name": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_id": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product": { "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_id": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product": { "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_id": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_id": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product": { "name": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_id": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product": { "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_id": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product": { "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_id": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product": { "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_id": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product": { "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_id": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_id": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "product": { "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "product_id": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "product": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "product_id": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "product": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "product_id": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product": { "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_id": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_id": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=s390x" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "product": { "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "product_id": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "product": { "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "product_id": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "product": { "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "product_id": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product": { "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_id": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product": { "name": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_id": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=s390x" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product": { "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_id": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product": { "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_id": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_id": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product": { "name": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_id": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_id": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product": { "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_id": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product": { "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_id": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product": { "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_id": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_id": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "product": { "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "product_id": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "product": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "product_id": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "product": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "product_id": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product": { "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_id": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_id": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product": { "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product_id": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product": { "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product_id": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product": { "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product_id": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product": { "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_id": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product": { "name": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_id": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product": { "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_id": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product": { "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_id": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_id": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, "product_reference": "httpd:2.4:8020020220321171949:4cda2c84", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64" }, "product_reference": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le" }, "product_reference": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x" }, "product_reference": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.src as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.src" }, "product_reference": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.src", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" }, "product_reference": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64" }, "product_reference": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64" }, "product_reference": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le" }, "product_reference": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x" }, "product_reference": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64" }, "product_reference": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le" }, "product_reference": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x" }, "product_reference": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch" }, "product_reference": "httpd-manual-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64" }, "product_reference": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le" }, "product_reference": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x" }, "product_reference": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64" }, "product_reference": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le" }, "product_reference": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x" }, "product_reference": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src" }, "product_reference": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64" }, "product_reference": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64" }, "product_reference": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le" }, "product_reference": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x" }, "product_reference": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64" }, "product_reference": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le" }, "product_reference": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x" }, "product_reference": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64" }, "product_reference": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le" }, "product_reference": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x" }, "product_reference": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64" }, "product_reference": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le" }, "product_reference": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x" }, "product_reference": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src" }, "product_reference": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64" }, "product_reference": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le" }, "product_reference": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x" }, "product_reference": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64" }, "product_reference": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le" }, "product_reference": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x" }, "product_reference": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64" }, "product_reference": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64" }, "product_reference": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x" }, "product_reference": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64" }, "product_reference": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le" }, "product_reference": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x" }, "product_reference": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" }, "product_reference": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le" }, "product_reference": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x" }, "product_reference": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64" }, "product_reference": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le" }, "product_reference": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x" }, "product_reference": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-22720", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064321" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd. The inbound connection is not closed when it fails to discard the request body, which may expose the server to HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.src", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22720" }, { "category": "external", "summary": "RHBZ#2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-29T09:20:09+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.src", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1102" }, { "category": "workaround", "details": "There are currently no known mitigations for this issue.", "product_ids": [ "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.src", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.src", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling" } ] }
rhsa-2022:1136
Vulnerability from csaf_redhat
Published
2022-04-01 22:32
Modified
2025-02-28 01:33
Summary
Red Hat Security Advisory: httpd security update
Notes
Topic
An update for httpd is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update Support, and Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_lua: Possible buffer overflow when parsing multipart content (CVE-2021-44790)
* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for httpd is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update Support, and Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: mod_lua: Possible buffer overflow when parsing multipart content (CVE-2021-44790)\n\n* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1136", "url": "https://access.redhat.com/errata/RHSA-2022:1136" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2034674", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034674" }, { "category": "external", "summary": "2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1136.json" } ], "title": "Red Hat Security Advisory: httpd security update", "tracking": { "current_release_date": "2025-02-28T01:33:42+00:00", "generator": { "date": "2025-02-28T01:33:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.3.1" } }, "id": "RHSA-2022:1136", "initial_release_date": "2022-04-01T22:32:06+00:00", "revision_history": [ { "date": "2022-04-01T22:32:06+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-04-01T22:32:06+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-02-28T01:33:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 7.6)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server E4S (v. 7.6)", "product": { "name": "Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:7.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product": { "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:7.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server TUS (v. 7.6)", "product": { "name": "Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:7.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product": { "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:7.6::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-89.el7_6.4.src", "product": { "name": "httpd-0:2.4.6-89.el7_6.4.src", "product_id": "httpd-0:2.4.6-89.el7_6.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-89.el7_6.4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-89.el7_6.4.x86_64", "product": { "name": "httpd-0:2.4.6-89.el7_6.4.x86_64", "product_id": "httpd-0:2.4.6-89.el7_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-89.el7_6.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "product": { "name": "httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "product_id": "httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-89.el7_6.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "product": { "name": "httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "product_id": "httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-89.el7_6.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-89.el7_6.4.x86_64", "product": { "name": "mod_session-0:2.4.6-89.el7_6.4.x86_64", "product_id": "mod_session-0:2.4.6-89.el7_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-89.el7_6.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "product": { "name": "mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "product_id": "mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-89.el7_6.4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "product_id": "httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-89.el7_6.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "product": { "name": "mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "product_id": "mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-89.el7_6.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "product": { "name": "mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "product_id": "mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-89.el7_6.4?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-manual-0:2.4.6-89.el7_6.4.noarch", "product": { "name": "httpd-manual-0:2.4.6-89.el7_6.4.noarch", "product_id": "httpd-manual-0:2.4.6-89.el7_6.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-89.el7_6.4?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "product": { "name": "mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "product_id": "mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-89.el7_6.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "product_id": "mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-89.el7_6.4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "product_id": "httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-89.el7_6.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-0:2.4.6-89.el7_6.4.ppc64le", "product": { "name": "httpd-0:2.4.6-89.el7_6.4.ppc64le", "product_id": "httpd-0:2.4.6-89.el7_6.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-89.el7_6.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "product": { "name": "httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "product_id": "httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-89.el7_6.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "product": { "name": "httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "product_id": "httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-89.el7_6.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-89.el7_6.4.ppc64le", "product": { "name": "mod_session-0:2.4.6-89.el7_6.4.ppc64le", "product_id": "mod_session-0:2.4.6-89.el7_6.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-89.el7_6.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "product": { "name": "mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "product_id": "mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-89.el7_6.4?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-89.el7_6.4.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src" }, "product_reference": "httpd-0:2.4.6-89.el7_6.4.src", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-89.el7_6.4.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch" }, "product_reference": "httpd-manual-0:2.4.6-89.el7_6.4.noarch", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_session-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)", "product_id": "7Server-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-89.el7_6.4.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le" }, "product_reference": "httpd-0:2.4.6-89.el7_6.4.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-89.el7_6.4.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src" }, "product_reference": "httpd-0:2.4.6-89.el7_6.4.src", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-89.el7_6.4.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le" }, "product_reference": "httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-89.el7_6.4.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch" }, "product_reference": "httpd-manual-0:2.4.6-89.el7_6.4.noarch", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-89.el7_6.4.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le" }, "product_reference": "httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-89.el7_6.4.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le" }, "product_reference": "mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-89.el7_6.4.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le" }, "product_reference": "mod_session-0:2.4.6-89.el7_6.4.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_session-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-89.el7_6.4.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le" }, "product_reference": "mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)", "product_id": "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-89.el7_6.4.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src" }, "product_reference": "httpd-0:2.4.6-89.el7_6.4.src", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-89.el7_6.4.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch" }, "product_reference": "httpd-manual-0:2.4.6-89.el7_6.4.noarch", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_session-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)", "product_id": "7Server-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-89.el7_6.4.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src" }, "product_reference": "httpd-0:2.4.6-89.el7_6.4.src", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-89.el7_6.4.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch" }, "product_reference": "httpd-manual-0:2.4.6-89.el7_6.4.noarch", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_session-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)", "product_id": "7Server-optional-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-89.el7_6.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le" }, "product_reference": "httpd-0:2.4.6-89.el7_6.4.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-89.el7_6.4.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src" }, "product_reference": "httpd-0:2.4.6-89.el7_6.4.src", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-89.el7_6.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le" }, "product_reference": "httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-89.el7_6.4.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch" }, "product_reference": "httpd-manual-0:2.4.6-89.el7_6.4.noarch", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-89.el7_6.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le" }, "product_reference": "httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-89.el7_6.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le" }, "product_reference": "mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-89.el7_6.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le" }, "product_reference": "mod_session-0:2.4.6-89.el7_6.4.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_session-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-89.el7_6.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le" }, "product_reference": "mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)", "product_id": "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-89.el7_6.4.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src" }, "product_reference": "httpd-0:2.4.6-89.el7_6.4.src", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-89.el7_6.4.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch" }, "product_reference": "httpd-manual-0:2.4.6-89.el7_6.4.noarch", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_session-0:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-89.el7_6.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)", "product_id": "7Server-optional-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "relates_to_product_reference": "7Server-optional-7.6.TUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-44790", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034674" } ], "notes": [ { "category": "description", "text": "A buffer overflow flaw in httpd\u0027s lua module could allow an out-of-bounds write. An attacker who is able to submit a crafted request to an httpd instance that is using the lua module may be able to cause an impact to confidentiality, integrity, and/or availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_lua: Possible buffer overflow when parsing multipart content", "title": "Vulnerability summary" }, { "category": "other", "text": "httpd as shipped in Red Hat Enterprise Linux 6 is NOT affected by this flaw because it does not ship mod_lua.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-44790" }, { "category": "external", "summary": "RHBZ#2034674", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034674" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44790", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44790" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44790", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44790" }, { "category": "external", "summary": "http://httpd.apache.org/security/vulnerabilities_24.html", "url": "http://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-01T22:32:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1136" }, { "category": "workaround", "details": "Disabling mod_lua and restarting httpd will mitigate this flaw. See https://access.redhat.com/articles/10649 for more information.", "product_ids": [ "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: mod_lua: Possible buffer overflow when parsing multipart content" }, { "cve": "CVE-2022-22720", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064321" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd. The inbound connection is not closed when it fails to discard the request body, which may expose the server to HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22720" }, { "category": "external", "summary": "RHBZ#2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-01T22:32:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1136" }, { "category": "workaround", "details": "There are currently no known mitigations for this issue.", "product_ids": [ "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "7Server-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.AUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.AUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.AUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.E4S:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.ppc64le", "7Server-optional-7.6.E4S:mod_ssl-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.src", "7Server-optional-7.6.TUS:httpd-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-debuginfo-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-devel-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:httpd-manual-0:2.4.6-89.el7_6.4.noarch", "7Server-optional-7.6.TUS:httpd-tools-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_ldap-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_proxy_html-1:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_session-0:2.4.6-89.el7_6.4.x86_64", "7Server-optional-7.6.TUS:mod_ssl-1:2.4.6-89.el7_6.4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling" } ] }
RHSA-2022:1080
Vulnerability from csaf_redhat
Published
2022-03-28 11:23
Modified
2025-02-28 01:29
Summary
Red Hat Security Advisory: httpd:2.4 security update
Notes
Topic
An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1080", "url": "https://access.redhat.com/errata/RHSA-2022:1080" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1080.json" } ], "title": "Red Hat Security Advisory: httpd:2.4 security update", "tracking": { "current_release_date": "2025-02-28T01:29:58+00:00", "generator": { "date": "2025-02-28T01:29:58+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.3.1" } }, "id": "RHSA-2022:1080", "initial_release_date": "2022-03-28T11:23:46+00:00", "revision_history": [ { "date": "2022-03-28T11:23:46+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-03-28T11:23:46+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-02-28T01:29:58+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:8.1::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd:2.4:8010020220321173048:c27ad7f8", "product": { "name": "httpd:2.4:8010020220321173048:c27ad7f8", "product_id": "httpd:2.4:8010020220321173048:c27ad7f8", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/httpd@2.4:8010020220321173048:c27ad7f8" } } }, { "category": "product_version", "name": "httpd-filesystem-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch", "product": { "name": "httpd-filesystem-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch", "product_id": "httpd-filesystem-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=noarch" } } }, { "category": "product_version", "name": "httpd-manual-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch", "product": { "name": "httpd-manual-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch", "product_id": "httpd-manual-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.src", "product": { "name": "httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.src", "product_id": "httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=src" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src", "product": { "name": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src", "product_id": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product": { "name": "httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_id": "httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_id": "httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product": { "name": "httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_id": "httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product": { "name": "httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_id": "httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product": { "name": "httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_id": "httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_id": "httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "product": { "name": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "product_id": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "product": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "product_id": "mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "product": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "product_id": "mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product": { "name": "mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_id": "mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_id": "mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product": { "name": "mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_id": "mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product": { "name": "mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_id": "mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_id": "mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product": { "name": "mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_id": "mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product": { "name": "mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_id": "mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product": { "name": "mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_id": "mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_id": "mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product": { "name": "httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_id": "httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_id": "httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product": { "name": "httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_id": "httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product": { "name": "httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_id": "httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product": { "name": "httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_id": "httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_id": "httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "product": { "name": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "product_id": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "product": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "product_id": "mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "product": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "product_id": "mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product": { "name": "mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_id": "mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_id": "mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product": { "name": "mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_id": "mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product": { "name": "mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_id": "mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product": { "name": "mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_id": "mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product": { "name": "mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_id": "mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product": { "name": "mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_id": "mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product": { "name": "mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_id": "mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_id": "mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, "product_reference": "httpd:2.4:8010020220321173048:c27ad7f8", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le" }, "product_reference": "httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.src as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.src" }, "product_reference": "httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.src", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" }, "product_reference": "httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le" }, "product_reference": "httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le" }, "product_reference": "httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-filesystem-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-manual-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch" }, "product_reference": "httpd-manual-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le" }, "product_reference": "httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le" }, "product_reference": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src" }, "product_reference": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64" }, "product_reference": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le" }, "product_reference": "mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le" }, "product_reference": "mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le" }, "product_reference": "mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le" }, "product_reference": "mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" }, "product_reference": "mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le" }, "product_reference": "mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" }, "product_reference": "mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le" }, "product_reference": "mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" }, "product_reference": "mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le" }, "product_reference": "mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le" }, "product_reference": "mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-22720", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064321" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd. The inbound connection is not closed when it fails to discard the request body, which may expose the server to HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.src", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-filesystem-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-manual-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22720" }, { "category": "external", "summary": "RHBZ#2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-28T11:23:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.src", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-filesystem-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-manual-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1080" }, { "category": "workaround", "details": "There are currently no known mitigations for this issue.", "product_ids": [ "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.src", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-filesystem-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-manual-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.src", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-filesystem-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-manual-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling" } ] }
rhsa-2022_1139
Vulnerability from csaf_redhat
Published
2022-04-01 22:26
Modified
2024-11-15 14:46
Summary
Red Hat Security Advisory: httpd security update
Notes
Topic
An update for httpd is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_lua: Possible buffer overflow when parsing multipart content (CVE-2021-44790)
* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for httpd is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: mod_lua: Possible buffer overflow when parsing multipart content (CVE-2021-44790)\n\n* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1139", "url": "https://access.redhat.com/errata/RHSA-2022:1139" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2034674", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034674" }, { "category": "external", "summary": "2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1139.json" } ], "title": "Red Hat Security Advisory: httpd security update", "tracking": { "current_release_date": "2024-11-15T14:46:16+00:00", "generator": { "date": "2024-11-15T14:46:16+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:1139", "initial_release_date": "2022-04-01T22:26:42+00:00", "revision_history": [ { "date": "2022-04-01T22:26:42+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-04-01T22:26:42+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T14:46:16+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 7.3)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.3::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.3::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-45.el7_3.8.src", "product": { "name": "httpd-0:2.4.6-45.el7_3.8.src", "product_id": "httpd-0:2.4.6-45.el7_3.8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-45.el7_3.8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-45.el7_3.8.x86_64", "product": { "name": "httpd-0:2.4.6-45.el7_3.8.x86_64", "product_id": "httpd-0:2.4.6-45.el7_3.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-45.el7_3.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "product": { "name": "httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "product_id": "httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-45.el7_3.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "product": { "name": "httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "product_id": "httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-45.el7_3.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-45.el7_3.8.x86_64", "product": { "name": "mod_ssl-1:2.4.6-45.el7_3.8.x86_64", "product_id": "mod_ssl-1:2.4.6-45.el7_3.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-45.el7_3.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "product_id": "httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-45.el7_3.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "product": { "name": "mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "product_id": "mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-45.el7_3.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "product": { "name": "mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "product_id": "mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-45.el7_3.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-45.el7_3.8.x86_64", "product": { "name": "mod_session-0:2.4.6-45.el7_3.8.x86_64", "product_id": "mod_session-0:2.4.6-45.el7_3.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-45.el7_3.8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-manual-0:2.4.6-45.el7_3.8.noarch", "product": { "name": "httpd-manual-0:2.4.6-45.el7_3.8.noarch", "product_id": "httpd-manual-0:2.4.6-45.el7_3.8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-45.el7_3.8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-45.el7_3.8.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src" }, "product_reference": "httpd-0:2.4.6-45.el7_3.8.src", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-45.el7_3.8.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64" }, "product_reference": "httpd-0:2.4.6-45.el7_3.8.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-45.el7_3.8.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-45.el7_3.8.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch" }, "product_reference": "httpd-manual-0:2.4.6-45.el7_3.8.noarch", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-45.el7_3.8.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-45.el7_3.8.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-45.el7_3.8.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64" }, "product_reference": "mod_session-0:2.4.6-45.el7_3.8.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-45.el7_3.8.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-45.el7_3.8.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-45.el7_3.8.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src" }, "product_reference": "httpd-0:2.4.6-45.el7_3.8.src", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-45.el7_3.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64" }, "product_reference": "httpd-0:2.4.6-45.el7_3.8.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-45.el7_3.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-45.el7_3.8.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch" }, "product_reference": "httpd-manual-0:2.4.6-45.el7_3.8.noarch", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-45.el7_3.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-45.el7_3.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-45.el7_3.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64" }, "product_reference": "mod_session-0:2.4.6-45.el7_3.8.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-45.el7_3.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-45.el7_3.8.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-44790", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034674" } ], "notes": [ { "category": "description", "text": "A buffer overflow flaw in httpd\u0027s lua module could allow an out-of-bounds write. An attacker who is able to submit a crafted request to an httpd instance that is using the lua module may be able to cause an impact to confidentiality, integrity, and/or availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_lua: Possible buffer overflow when parsing multipart content", "title": "Vulnerability summary" }, { "category": "other", "text": "httpd as shipped in Red Hat Enterprise Linux 6 is NOT affected by this flaw because it does not ship mod_lua.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src", "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch", "7Server-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src", "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch", "7Server-optional-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-44790" }, { "category": "external", "summary": "RHBZ#2034674", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034674" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44790", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44790" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44790", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44790" }, { "category": "external", "summary": "http://httpd.apache.org/security/vulnerabilities_24.html", "url": "http://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-01T22:26:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src", "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch", "7Server-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src", "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch", "7Server-optional-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1139" }, { "category": "workaround", "details": "Disabling mod_lua and restarting httpd will mitigate this flaw. See https://access.redhat.com/articles/10649 for more information.", "product_ids": [ "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src", "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch", "7Server-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src", "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch", "7Server-optional-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src", "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch", "7Server-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src", "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch", "7Server-optional-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: mod_lua: Possible buffer overflow when parsing multipart content" }, { "cve": "CVE-2022-22720", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064321" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd. The inbound connection is not closed when it fails to discard the request body, which may expose the server to HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src", "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch", "7Server-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src", "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch", "7Server-optional-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22720" }, { "category": "external", "summary": "RHBZ#2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-01T22:26:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src", "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch", "7Server-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src", "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch", "7Server-optional-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1139" }, { "category": "workaround", "details": "There are currently no known mitigations for this issue.", "product_ids": [ "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src", "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch", "7Server-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src", "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch", "7Server-optional-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src", "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch", "7Server-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src", "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch", "7Server-optional-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling" } ] }
rhsa-2022_1390
Vulnerability from csaf_redhat
Published
2022-04-20 19:30
Modified
2025-01-06 19:55
Summary
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP11 security update
Notes
Topic
Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 11 zip release for Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 8, and Microsoft Windows is available.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.
This release adds the new Apache HTTP Server 2.4.37 Service Pack 11 packages that are part of the JBoss Core Services offering.
This release serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 10 and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes and enhancements included in this release.
Security Fix(es):
* jbcs-httpd24-httpd: httpd: HTTP request smuggling vulnerability in Apache HTTP Server 2.4.52 and earlier (CVE-2022-22720)
* libxml2: use-after-free in xmlXIncludeDoProcess() in xinclude.c (CVE-2021-3518)
* libxml2: heap-based buffer overflow in xmlEncodeEntitiesInternal() in entities.c (CVE-2021-3517)
* libxml2: use-after-free in xmlEncodeEntitiesInternal() in entities.c (CVE-2021-3516)
* libxml2: Exponential entity expansion attack bypasses all existing protection mechanisms (CVE-2021-3541)
* libxml2: NULL pointer dereference when post-validating mixed content parsed in recovery mode (CVE-2021-3537)
* libxml2: Use-after-free of ID and IDREF attributes (CVE-2022-23308)
* openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 11 zip release for Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 8, and Microsoft Windows is available.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.\n\nThis release adds the new Apache HTTP Server 2.4.37 Service Pack 11 packages that are part of the JBoss Core Services offering.\n\nThis release serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 10 and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* jbcs-httpd24-httpd: httpd: HTTP request smuggling vulnerability in Apache HTTP Server 2.4.52 and earlier (CVE-2022-22720)\n* libxml2: use-after-free in xmlXIncludeDoProcess() in xinclude.c (CVE-2021-3518)\n* libxml2: heap-based buffer overflow in xmlEncodeEntitiesInternal() in entities.c (CVE-2021-3517)\n* libxml2: use-after-free in xmlEncodeEntitiesInternal() in entities.c (CVE-2021-3516)\n* libxml2: Exponential entity expansion attack bypasses all existing protection mechanisms (CVE-2021-3541)\n* libxml2: NULL pointer dereference when post-validating mixed content parsed in recovery mode (CVE-2021-3537)\n* libxml2: Use-after-free of ID and IDREF attributes (CVE-2022-23308)\n* openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1390", "url": "https://access.redhat.com/errata/RHSA-2022:1390" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1950515", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1950515" }, { "category": "external", "summary": "1954225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954225" }, { "category": "external", "summary": "1954232", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954232" }, { "category": "external", "summary": "1954242", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954242" }, { "category": "external", "summary": "1956522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956522" }, { "category": "external", "summary": "2056913", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056913" }, { "category": "external", "summary": "2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "external", "summary": "2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1390.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP11 security update", "tracking": { "current_release_date": "2025-01-06T19:55:29+00:00", "generator": { "date": "2025-01-06T19:55:29+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.5" } }, "id": "RHSA-2022:1390", "initial_release_date": "2022-04-20T19:30:18+00:00", "revision_history": [ { "date": "2022-04-20T19:30:18+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-04-20T19:30:18+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-01-06T19:55:29+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Core Services 1", "product": { "name": "Red Hat JBoss Core Services 1", "product_id": "Red Hat JBoss Core Services 1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1" } } } ], "category": "product_family", "name": "Red Hat JBoss Core Services" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "zodf0055980" ], "organization": "SQLab NCTU Taiwan" } ], "cve": "CVE-2021-3516", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-04-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1954225" } ], "notes": [ { "category": "description", "text": "There\u0027s a flaw in libxml2\u0027s xmllint. An attacker who is able to submit a crafted file to be processed by xmllint could trigger a use-after-free. The greatest impact of this flaw is to confidentiality, integrity, and availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Use-after-free in xmlEncodeEntitiesInternal() in entities.c", "title": "Vulnerability summary" }, { "category": "other", "text": "The only known exploitation path of this flaw is via the xmllint tool.\n\nThis flaw is out of support scope for Red Hat Enterprise Linux 6 and 7. To learn more about Red Hat Enterprise Linux support life cycles, please see https://access.redhat.com/support/policy/updates/errata .", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3516" }, { "category": "external", "summary": "RHBZ#1954225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954225" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3516", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3516" } ], "release_date": "2021-04-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:30:18+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1390" }, { "category": "workaround", "details": "This flaw can be mitigated by not using xmllint with the --html and --push options together.", "product_ids": [ "Red Hat JBoss Core Services 1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Use-after-free in xmlEncodeEntitiesInternal() in entities.c" }, { "acknowledgments": [ { "names": [ "zodf0055980" ], "organization": "SQLab NCTU Taiwan" } ], "cve": "CVE-2021-3517", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-04-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1954232" } ], "notes": [ { "category": "description", "text": "There is a flaw in the xml entity encoding functionality of libxml2. An attacker who is able to supply a crafted file to be processed by an application linked with the affected functionality of libxml2 could trigger an out-of-bounds read. The most likely impact of this flaw is to application availability, with some potential impact to confidentiality and integrity if an attacker is able to use memory information to further exploit the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Heap-based buffer overflow in xmlEncodeEntitiesInternal() in entities.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is out of support scope for Red Hat Enterprise Linux 6 and 7. To learn more about Red Hat Enterprise Linux support life cycles, please see https://access.redhat.com/support/policy/updates/errata .", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3517" }, { "category": "external", "summary": "RHBZ#1954232", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954232" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3517", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3517" } ], "release_date": "2021-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:30:18+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1390" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Heap-based buffer overflow in xmlEncodeEntitiesInternal() in entities.c" }, { "acknowledgments": [ { "names": [ "zodf0055980" ], "organization": "SQLab NCTU Taiwan" } ], "cve": "CVE-2021-3518", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-04-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1954242" } ], "notes": [ { "category": "description", "text": "There\u0027s a flaw in libxml2. An attacker who is able to submit a crafted file to be processed by an application linked with libxml2 could trigger a use-after-free. The greatest impact from this flaw is to confidentiality, integrity, and availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Use-after-free in xmlXIncludeDoProcess() in xinclude.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is out of support scope for Red Hat Enterprise Linux 6 and 7. To learn more about Red Hat Enterprise Linux support life cycles, please see https://access.redhat.com/support/policy/updates/errata .", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3518" }, { "category": "external", "summary": "RHBZ#1954242", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954242" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3518", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3518" } ], "release_date": "2021-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:30:18+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1390" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Use-after-free in xmlXIncludeDoProcess() in xinclude.c" }, { "acknowledgments": [ { "names": [ "yuawn" ], "organization": "NSLab NTU Taiwan" } ], "cve": "CVE-2021-3537", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2021-05-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1956522" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in libxml2, where it did not propagate errors while parsing XML mixed content. This flaw causes the application to crash if an untrusted XML document is parsed in recovery mode and post validated. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: NULL pointer dereference when post-validating mixed content parsed in recovery mode", "title": "Vulnerability summary" }, { "category": "other", "text": "For the flaw to be exploitable, the document must be parsed in recovery mode and post validated (e.g.: when used in the `xmlling` tool, both `-recover` and `-postvalid` options must be used for the flaw to be exploitable)", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3537" }, { "category": "external", "summary": "RHBZ#1956522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956522" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3537", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3537" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3537", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3537" } ], "release_date": "2021-05-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:30:18+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1390" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: NULL pointer dereference when post-validating mixed content parsed in recovery mode" }, { "acknowledgments": [ { "names": [ "Sebastian Pipping" ] } ], "cve": "CVE-2021-3541", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1950515" } ], "notes": [ { "category": "description", "text": "A flaw was found in libxml2. Exponential entity expansion attack its possible bypassing all existing protection mechanisms and leading to denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Exponential entity expansion attack bypasses all existing protection mechanisms", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3541" }, { "category": "external", "summary": "RHBZ#1950515", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1950515" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3541", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3541" } ], "release_date": "2021-05-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:30:18+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1390" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Exponential entity expansion attack bypasses all existing protection mechanisms" }, { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2022-03-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2062202" } ], "notes": [ { "category": "description", "text": "A flaw was found in OpenSSL. It is possible to trigger an infinite loop by crafting a certificate that has invalid elliptic curve parameters. Since certificate parsing happens before verification of the certificate signature, any process that parses an externally supplied certificate may be subject to a denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates", "title": "Vulnerability summary" }, { "category": "other", "text": "While Red Hat initially stated not to be directly affected by this flaw, after further investigation we found that the versions of OpenSSL as shipped in Red Hat Enterprise Linux 6, 7, and 8 are vulnerable to a denial of service attack through malicious Elliptic Curve parameters. During processing of the parameters OpenSSL will call BN_mod_sqrt() with invalid arguments, causing the process to enter an infinite loop. The invalid EC parameters can be provided to OpenSSL through X.509 certificates (used in TLS connections), through public and private keys, through certificate signing requests and other places where applications process Elliptic Curve parameters. The flaw has been rated as having a security impact of Important. A future update will address this issue in Red Hat Enterprise Linux 6, 7 and 8.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0778" }, { "category": "external", "summary": "RHBZ#2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0778", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0778" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20220315.txt", "url": "https://www.openssl.org/news/secadv/20220315.txt" } ], "release_date": "2022-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:30:18+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1390" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "Red Hat JBoss Core Services 1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates" }, { "cve": "CVE-2022-22720", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064321" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd. The inbound connection is not closed when it fails to discard the request body, which may expose the server to HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22720" }, { "category": "external", "summary": "RHBZ#2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:30:18+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1390" }, { "category": "workaround", "details": "There are currently no known mitigations for this issue.", "product_ids": [ "Red Hat JBoss Core Services 1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling" }, { "cve": "CVE-2022-23308", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-02-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2056913" } ], "notes": [ { "category": "description", "text": "A flaw was found in libxml2. A call to the xmlGetID function can return a pointer already freed when parsing an XML document with the XML_PARSE_DTDVALID option and without the XML_PARSE_NOENT option, resulting in a use-after-free issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Use-after-free of ID and IDREF attributes", "title": "Vulnerability summary" }, { "category": "other", "text": "The security impact of xmlGetID() returning a pointer to freed memory depends on the application and will mostly result in a denial of service (DoS). The typical use case of calling xmlGetID() on an unmodified document is not affected, therefore this issue was rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23308" }, { "category": "external", "summary": "RHBZ#2056913", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056913" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23308", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23308" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23308", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23308" } ], "release_date": "2022-02-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:30:18+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1390" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Use-after-free of ID and IDREF attributes" } ] }
rhsa-2022_1138
Vulnerability from csaf_redhat
Published
2022-04-01 22:24
Modified
2024-11-15 14:46
Summary
Red Hat Security Advisory: httpd security update
Notes
Topic
An update for httpd is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_lua: Possible buffer overflow when parsing multipart content (CVE-2021-44790)
* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for httpd is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: mod_lua: Possible buffer overflow when parsing multipart content (CVE-2021-44790)\n\n* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1138", "url": "https://access.redhat.com/errata/RHSA-2022:1138" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2034674", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034674" }, { "category": "external", "summary": "2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1138.json" } ], "title": "Red Hat Security Advisory: httpd security update", "tracking": { "current_release_date": "2024-11-15T14:46:08+00:00", "generator": { "date": "2024-11-15T14:46:08+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:1138", "initial_release_date": "2022-04-01T22:24:31+00:00", "revision_history": [ { "date": "2022-04-01T22:24:31+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-04-01T22:24:31+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T14:46:08+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.4::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.4::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-67.el7_4.9.src", "product": { "name": "httpd-0:2.4.6-67.el7_4.9.src", "product_id": "httpd-0:2.4.6-67.el7_4.9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-67.el7_4.9?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-67.el7_4.9.x86_64", "product": { "name": "httpd-0:2.4.6-67.el7_4.9.x86_64", "product_id": "httpd-0:2.4.6-67.el7_4.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-67.el7_4.9?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "product": { "name": "httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "product_id": "httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-67.el7_4.9?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "product": { "name": "httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "product_id": "httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-67.el7_4.9?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-67.el7_4.9.x86_64", "product": { "name": "mod_session-0:2.4.6-67.el7_4.9.x86_64", "product_id": "mod_session-0:2.4.6-67.el7_4.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-67.el7_4.9?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-67.el7_4.9.x86_64", "product": { "name": "mod_ssl-1:2.4.6-67.el7_4.9.x86_64", "product_id": "mod_ssl-1:2.4.6-67.el7_4.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-67.el7_4.9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "product_id": "httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-67.el7_4.9?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "product": { "name": "mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "product_id": "mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-67.el7_4.9?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "product": { "name": "mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "product_id": "mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-67.el7_4.9?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-manual-0:2.4.6-67.el7_4.9.noarch", "product": { "name": "httpd-manual-0:2.4.6-67.el7_4.9.noarch", "product_id": "httpd-manual-0:2.4.6-67.el7_4.9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-67.el7_4.9?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-67.el7_4.9.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src" }, "product_reference": "httpd-0:2.4.6-67.el7_4.9.src", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-67.el7_4.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64" }, "product_reference": "httpd-0:2.4.6-67.el7_4.9.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-67.el7_4.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-67.el7_4.9.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch" }, "product_reference": "httpd-manual-0:2.4.6-67.el7_4.9.noarch", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-67.el7_4.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-67.el7_4.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-67.el7_4.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64" }, "product_reference": "mod_session-0:2.4.6-67.el7_4.9.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-67.el7_4.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-67.el7_4.9.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-67.el7_4.9.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src" }, "product_reference": "httpd-0:2.4.6-67.el7_4.9.src", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-67.el7_4.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64" }, "product_reference": "httpd-0:2.4.6-67.el7_4.9.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-67.el7_4.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-67.el7_4.9.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch" }, "product_reference": "httpd-manual-0:2.4.6-67.el7_4.9.noarch", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-67.el7_4.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-67.el7_4.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-67.el7_4.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64" }, "product_reference": "mod_session-0:2.4.6-67.el7_4.9.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-67.el7_4.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-67.el7_4.9.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-44790", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034674" } ], "notes": [ { "category": "description", "text": "A buffer overflow flaw in httpd\u0027s lua module could allow an out-of-bounds write. An attacker who is able to submit a crafted request to an httpd instance that is using the lua module may be able to cause an impact to confidentiality, integrity, and/or availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_lua: Possible buffer overflow when parsing multipart content", "title": "Vulnerability summary" }, { "category": "other", "text": "httpd as shipped in Red Hat Enterprise Linux 6 is NOT affected by this flaw because it does not ship mod_lua.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src", "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch", "7Server-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src", "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch", "7Server-optional-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-44790" }, { "category": "external", "summary": "RHBZ#2034674", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034674" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44790", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44790" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44790", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44790" }, { "category": "external", "summary": "http://httpd.apache.org/security/vulnerabilities_24.html", "url": "http://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-01T22:24:31+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src", "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch", "7Server-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src", "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch", "7Server-optional-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1138" }, { "category": "workaround", "details": "Disabling mod_lua and restarting httpd will mitigate this flaw. See https://access.redhat.com/articles/10649 for more information.", "product_ids": [ "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src", "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch", "7Server-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src", "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch", "7Server-optional-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src", "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch", "7Server-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src", "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch", "7Server-optional-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: mod_lua: Possible buffer overflow when parsing multipart content" }, { "cve": "CVE-2022-22720", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064321" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd. The inbound connection is not closed when it fails to discard the request body, which may expose the server to HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src", "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch", "7Server-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src", "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch", "7Server-optional-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22720" }, { "category": "external", "summary": "RHBZ#2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-01T22:24:31+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src", "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch", "7Server-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src", "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch", "7Server-optional-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1138" }, { "category": "workaround", "details": "There are currently no known mitigations for this issue.", "product_ids": [ "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src", "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch", "7Server-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src", "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch", "7Server-optional-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src", "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch", "7Server-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src", "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch", "7Server-optional-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling" } ] }
rhsa-2022:1173
Vulnerability from csaf_redhat
Published
2022-04-04 09:26
Modified
2025-02-28 01:30
Summary
Red Hat Security Advisory: httpd security update
Notes
Topic
An update for httpd is now available for Red Hat Enterprise Linux 6 Extended Lifecycle Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for httpd is now available for Red Hat Enterprise Linux 6 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1173", "url": "https://access.redhat.com/errata/RHSA-2022:1173" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1173.json" } ], "title": "Red Hat Security Advisory: httpd security update", "tracking": { "current_release_date": "2025-02-28T01:30:04+00:00", "generator": { "date": "2025-02-28T01:30:04+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.3.1" } }, "id": "RHSA-2022:1173", "initial_release_date": "2022-04-04T09:26:39+00:00", "revision_history": [ { "date": "2022-04-04T09:26:39+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-04-04T09:26:39+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-02-28T01:30:04+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6 ELS)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_els:6" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.2.15-70.el6_10.src", "product": { "name": "httpd-0:2.2.15-70.el6_10.src", "product_id": "httpd-0:2.2.15-70.el6_10.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.15-70.el6_10?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.2.15-70.el6_10.x86_64", "product": { "name": "httpd-0:2.2.15-70.el6_10.x86_64", "product_id": "httpd-0:2.2.15-70.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.15-70.el6_10?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.15-70.el6_10.x86_64", "product": { "name": "httpd-devel-0:2.2.15-70.el6_10.x86_64", "product_id": "httpd-devel-0:2.2.15-70.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-70.el6_10?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.2.15-70.el6_10.x86_64", "product": { "name": "httpd-tools-0:2.2.15-70.el6_10.x86_64", "product_id": "httpd-tools-0:2.2.15-70.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.2.15-70.el6_10?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.2.15-70.el6_10.x86_64", "product": { "name": "mod_ssl-1:2.2.15-70.el6_10.x86_64", "product_id": "mod_ssl-1:2.2.15-70.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.15-70.el6_10?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.2.15-70.el6_10.x86_64", "product": { "name": "httpd-debuginfo-0:2.2.15-70.el6_10.x86_64", "product_id": "httpd-debuginfo-0:2.2.15-70.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-70.el6_10?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-devel-0:2.2.15-70.el6_10.i686", "product": { "name": "httpd-devel-0:2.2.15-70.el6_10.i686", "product_id": "httpd-devel-0:2.2.15-70.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-70.el6_10?arch=i686" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.2.15-70.el6_10.i686", "product": { "name": "httpd-debuginfo-0:2.2.15-70.el6_10.i686", "product_id": "httpd-debuginfo-0:2.2.15-70.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-70.el6_10?arch=i686" } } }, { "category": "product_version", "name": "httpd-0:2.2.15-70.el6_10.i686", "product": { "name": "httpd-0:2.2.15-70.el6_10.i686", "product_id": "httpd-0:2.2.15-70.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.15-70.el6_10?arch=i686" } } }, { "category": "product_version", "name": "httpd-tools-0:2.2.15-70.el6_10.i686", "product": { "name": "httpd-tools-0:2.2.15-70.el6_10.i686", "product_id": "httpd-tools-0:2.2.15-70.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.2.15-70.el6_10?arch=i686" } } }, { "category": "product_version", "name": "mod_ssl-1:2.2.15-70.el6_10.i686", "product": { "name": "mod_ssl-1:2.2.15-70.el6_10.i686", "product_id": "mod_ssl-1:2.2.15-70.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.15-70.el6_10?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.2.15-70.el6_10.s390x", "product": { "name": "httpd-0:2.2.15-70.el6_10.s390x", "product_id": "httpd-0:2.2.15-70.el6_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.15-70.el6_10?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.15-70.el6_10.s390x", "product": { "name": "httpd-devel-0:2.2.15-70.el6_10.s390x", "product_id": "httpd-devel-0:2.2.15-70.el6_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-70.el6_10?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-0:2.2.15-70.el6_10.s390x", "product": { "name": "httpd-tools-0:2.2.15-70.el6_10.s390x", "product_id": "httpd-tools-0:2.2.15-70.el6_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.2.15-70.el6_10?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.2.15-70.el6_10.s390x", "product": { "name": "mod_ssl-1:2.2.15-70.el6_10.s390x", "product_id": "mod_ssl-1:2.2.15-70.el6_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.15-70.el6_10?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.2.15-70.el6_10.s390x", "product": { "name": "httpd-debuginfo-0:2.2.15-70.el6_10.s390x", "product_id": "httpd-debuginfo-0:2.2.15-70.el6_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-70.el6_10?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-devel-0:2.2.15-70.el6_10.s390", "product": { "name": "httpd-devel-0:2.2.15-70.el6_10.s390", "product_id": "httpd-devel-0:2.2.15-70.el6_10.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-70.el6_10?arch=s390" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.2.15-70.el6_10.s390", "product": { "name": "httpd-debuginfo-0:2.2.15-70.el6_10.s390", "product_id": "httpd-debuginfo-0:2.2.15-70.el6_10.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-70.el6_10?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "httpd-manual-0:2.2.15-70.el6_10.noarch", "product": { "name": "httpd-manual-0:2.2.15-70.el6_10.noarch", "product_id": "httpd-manual-0:2.2.15-70.el6_10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.2.15-70.el6_10?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-70.el6_10.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:httpd-0:2.2.15-70.el6_10.i686" }, "product_reference": "httpd-0:2.2.15-70.el6_10.i686", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-70.el6_10.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:httpd-0:2.2.15-70.el6_10.s390x" }, "product_reference": "httpd-0:2.2.15-70.el6_10.s390x", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-70.el6_10.src as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:httpd-0:2.2.15-70.el6_10.src" }, "product_reference": "httpd-0:2.2.15-70.el6_10.src", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-70.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:httpd-0:2.2.15-70.el6_10.x86_64" }, "product_reference": "httpd-0:2.2.15-70.el6_10.x86_64", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-70.el6_10.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.i686" }, "product_reference": "httpd-debuginfo-0:2.2.15-70.el6_10.i686", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-70.el6_10.s390 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.s390" }, "product_reference": "httpd-debuginfo-0:2.2.15-70.el6_10.s390", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-70.el6_10.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.s390x" }, "product_reference": "httpd-debuginfo-0:2.2.15-70.el6_10.s390x", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-70.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.x86_64" }, "product_reference": "httpd-debuginfo-0:2.2.15-70.el6_10.x86_64", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-70.el6_10.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.i686" }, "product_reference": "httpd-devel-0:2.2.15-70.el6_10.i686", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-70.el6_10.s390 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.s390" }, "product_reference": "httpd-devel-0:2.2.15-70.el6_10.s390", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-70.el6_10.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.s390x" }, "product_reference": "httpd-devel-0:2.2.15-70.el6_10.s390x", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-70.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.x86_64" }, "product_reference": "httpd-devel-0:2.2.15-70.el6_10.x86_64", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.15-70.el6_10.noarch as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:httpd-manual-0:2.2.15-70.el6_10.noarch" }, "product_reference": "httpd-manual-0:2.2.15-70.el6_10.noarch", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-70.el6_10.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:httpd-tools-0:2.2.15-70.el6_10.i686" }, "product_reference": "httpd-tools-0:2.2.15-70.el6_10.i686", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-70.el6_10.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:httpd-tools-0:2.2.15-70.el6_10.s390x" }, "product_reference": "httpd-tools-0:2.2.15-70.el6_10.s390x", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-70.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:httpd-tools-0:2.2.15-70.el6_10.x86_64" }, "product_reference": "httpd-tools-0:2.2.15-70.el6_10.x86_64", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-70.el6_10.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:mod_ssl-1:2.2.15-70.el6_10.i686" }, "product_reference": "mod_ssl-1:2.2.15-70.el6_10.i686", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-70.el6_10.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:mod_ssl-1:2.2.15-70.el6_10.s390x" }, "product_reference": "mod_ssl-1:2.2.15-70.el6_10.s390x", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-70.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:mod_ssl-1:2.2.15-70.el6_10.x86_64" }, "product_reference": "mod_ssl-1:2.2.15-70.el6_10.x86_64", "relates_to_product_reference": "6Server-ELS" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-22720", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064321" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd. The inbound connection is not closed when it fails to discard the request body, which may expose the server to HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-ELS:httpd-0:2.2.15-70.el6_10.i686", "6Server-ELS:httpd-0:2.2.15-70.el6_10.s390x", "6Server-ELS:httpd-0:2.2.15-70.el6_10.src", "6Server-ELS:httpd-0:2.2.15-70.el6_10.x86_64", "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.i686", "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.s390", "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.s390x", "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.x86_64", "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.i686", "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.s390", "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.s390x", "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.x86_64", "6Server-ELS:httpd-manual-0:2.2.15-70.el6_10.noarch", "6Server-ELS:httpd-tools-0:2.2.15-70.el6_10.i686", "6Server-ELS:httpd-tools-0:2.2.15-70.el6_10.s390x", "6Server-ELS:httpd-tools-0:2.2.15-70.el6_10.x86_64", "6Server-ELS:mod_ssl-1:2.2.15-70.el6_10.i686", "6Server-ELS:mod_ssl-1:2.2.15-70.el6_10.s390x", "6Server-ELS:mod_ssl-1:2.2.15-70.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22720" }, { "category": "external", "summary": "RHBZ#2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-04T09:26:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-ELS:httpd-0:2.2.15-70.el6_10.i686", "6Server-ELS:httpd-0:2.2.15-70.el6_10.s390x", "6Server-ELS:httpd-0:2.2.15-70.el6_10.src", "6Server-ELS:httpd-0:2.2.15-70.el6_10.x86_64", "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.i686", "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.s390", "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.s390x", "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.x86_64", "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.i686", "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.s390", "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.s390x", "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.x86_64", "6Server-ELS:httpd-manual-0:2.2.15-70.el6_10.noarch", "6Server-ELS:httpd-tools-0:2.2.15-70.el6_10.i686", "6Server-ELS:httpd-tools-0:2.2.15-70.el6_10.s390x", "6Server-ELS:httpd-tools-0:2.2.15-70.el6_10.x86_64", "6Server-ELS:mod_ssl-1:2.2.15-70.el6_10.i686", "6Server-ELS:mod_ssl-1:2.2.15-70.el6_10.s390x", "6Server-ELS:mod_ssl-1:2.2.15-70.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1173" }, { "category": "workaround", "details": "There are currently no known mitigations for this issue.", "product_ids": [ "6Server-ELS:httpd-0:2.2.15-70.el6_10.i686", "6Server-ELS:httpd-0:2.2.15-70.el6_10.s390x", "6Server-ELS:httpd-0:2.2.15-70.el6_10.src", "6Server-ELS:httpd-0:2.2.15-70.el6_10.x86_64", "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.i686", "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.s390", "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.s390x", "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.x86_64", "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.i686", "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.s390", "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.s390x", "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.x86_64", "6Server-ELS:httpd-manual-0:2.2.15-70.el6_10.noarch", "6Server-ELS:httpd-tools-0:2.2.15-70.el6_10.i686", "6Server-ELS:httpd-tools-0:2.2.15-70.el6_10.s390x", "6Server-ELS:httpd-tools-0:2.2.15-70.el6_10.x86_64", "6Server-ELS:mod_ssl-1:2.2.15-70.el6_10.i686", "6Server-ELS:mod_ssl-1:2.2.15-70.el6_10.s390x", "6Server-ELS:mod_ssl-1:2.2.15-70.el6_10.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "6Server-ELS:httpd-0:2.2.15-70.el6_10.i686", "6Server-ELS:httpd-0:2.2.15-70.el6_10.s390x", "6Server-ELS:httpd-0:2.2.15-70.el6_10.src", "6Server-ELS:httpd-0:2.2.15-70.el6_10.x86_64", "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.i686", "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.s390", "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.s390x", "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.x86_64", "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.i686", "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.s390", "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.s390x", "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.x86_64", "6Server-ELS:httpd-manual-0:2.2.15-70.el6_10.noarch", "6Server-ELS:httpd-tools-0:2.2.15-70.el6_10.i686", "6Server-ELS:httpd-tools-0:2.2.15-70.el6_10.s390x", "6Server-ELS:httpd-tools-0:2.2.15-70.el6_10.x86_64", "6Server-ELS:mod_ssl-1:2.2.15-70.el6_10.i686", "6Server-ELS:mod_ssl-1:2.2.15-70.el6_10.s390x", "6Server-ELS:mod_ssl-1:2.2.15-70.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling" } ] }
rhsa-2022_1102
Vulnerability from csaf_redhat
Published
2022-03-29 09:20
Modified
2024-11-15 14:46
Summary
Red Hat Security Advisory: httpd:2.4 security update
Notes
Topic
An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1102", "url": "https://access.redhat.com/errata/RHSA-2022:1102" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1102.json" } ], "title": "Red Hat Security Advisory: httpd:2.4 security update", "tracking": { "current_release_date": "2024-11-15T14:46:02+00:00", "generator": { "date": "2024-11-15T14:46:02+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:1102", "initial_release_date": "2022-03-29T09:20:09+00:00", "revision_history": [ { "date": "2022-03-29T09:20:09+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-03-29T09:20:09+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T14:46:02+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.2::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd:2.4:8020020220321171949:4cda2c84", "product": { "name": "httpd:2.4:8020020220321171949:4cda2c84", "product_id": "httpd:2.4:8020020220321171949:4cda2c84", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/httpd@2.4:8020020220321171949:4cda2c84" } } }, { "category": "product_version", "name": "httpd-filesystem-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch", "product": { "name": "httpd-filesystem-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch", "product_id": "httpd-filesystem-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=noarch" } } }, { "category": "product_version", "name": "httpd-manual-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch", "product": { "name": "httpd-manual-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch", "product_id": "httpd-manual-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product": { "name": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_id": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product": { "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_id": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product": { "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_id": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product": { "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_id": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product": { "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_id": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_id": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "product": { "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "product_id": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "product": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "product_id": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "product": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "product_id": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product": { "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_id": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_id": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "product": { "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "product_id": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "product": { "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "product_id": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "product": { "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "product_id": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product": { "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_id": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product": { "name": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_id": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product": { "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_id": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product": { "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_id": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_id": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.src", "product": { "name": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.src", "product_id": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=src" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src", "product": { "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src", "product_id": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=src" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "product": { "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "product_id": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product": { "name": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_id": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_id": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product": { "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_id": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product": { "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_id": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product": { "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_id": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_id": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "product": { "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "product_id": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "product": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "product_id": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "product": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "product_id": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product": { "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_id": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_id": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "product": { "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "product_id": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "product": { "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "product_id": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "product": { "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "product_id": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_id": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product": { "name": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_id": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product": { "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_id": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product": { "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_id": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_id": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product": { "name": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_id": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product": { "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_id": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product": { "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_id": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product": { "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_id": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product": { "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_id": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_id": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "product": { "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "product_id": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "product": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "product_id": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "product": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "product_id": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product": { "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_id": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_id": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=s390x" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "product": { "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "product_id": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "product": { "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "product_id": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "product": { "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "product_id": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product": { "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_id": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product": { "name": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_id": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=s390x" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product": { "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_id": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product": { "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_id": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_id": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product": { "name": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_id": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_id": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product": { "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_id": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product": { "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_id": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product": { "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_id": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_id": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "product": { "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "product_id": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "product": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "product_id": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "product": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "product_id": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-3.module%2Bel8.2.0%2B7758%2B84b4ca3e.1?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product": { "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_id": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_id": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product": { "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product_id": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product": { "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product_id": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product": { "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product_id": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product": { "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_id": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product": { "name": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_id": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product": { "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_id": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product": { "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_id": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_id": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-21.module%2Bel8.2.0%2B14532%2Bbd4c0f23.4?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, "product_reference": "httpd:2.4:8020020220321171949:4cda2c84", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64" }, "product_reference": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le" }, "product_reference": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x" }, "product_reference": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.src as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.src" }, "product_reference": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.src", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" }, "product_reference": "httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64" }, "product_reference": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64" }, "product_reference": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le" }, "product_reference": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x" }, "product_reference": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64" }, "product_reference": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le" }, "product_reference": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x" }, "product_reference": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch" }, "product_reference": "httpd-manual-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64" }, "product_reference": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le" }, "product_reference": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x" }, "product_reference": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64" }, "product_reference": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le" }, "product_reference": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x" }, "product_reference": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src" }, "product_reference": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64" }, "product_reference": "mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64" }, "product_reference": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le" }, "product_reference": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x" }, "product_reference": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64" }, "product_reference": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le" }, "product_reference": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x" }, "product_reference": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64" }, "product_reference": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le" }, "product_reference": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x" }, "product_reference": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64" }, "product_reference": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le" }, "product_reference": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x" }, "product_reference": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src" }, "product_reference": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64" }, "product_reference": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le" }, "product_reference": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x" }, "product_reference": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64" }, "product_reference": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le" }, "product_reference": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x" }, "product_reference": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64" }, "product_reference": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64" }, "product_reference": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x" }, "product_reference": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64" }, "product_reference": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le" }, "product_reference": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x" }, "product_reference": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" }, "product_reference": "mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le" }, "product_reference": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x" }, "product_reference": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64" }, "product_reference": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le" }, "product_reference": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x" }, "product_reference": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64 as a component of httpd:2.4:8020020220321171949:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-22720", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064321" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd. The inbound connection is not closed when it fails to discard the request body, which may expose the server to HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.src", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22720" }, { "category": "external", "summary": "RHBZ#2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-29T09:20:09+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.src", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1102" }, { "category": "workaround", "details": "There are currently no known mitigations for this issue.", "product_ids": [ "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.src", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.src", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.noarch", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.src", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.aarch64", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.ppc64le", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.s390x", "AppStream-8.2.0.Z.EUS:httpd:2.4:8020020220321171949:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+14532+bd4c0f23.4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling" } ] }
rhsa-2022:1080
Vulnerability from csaf_redhat
Published
2022-03-28 11:23
Modified
2025-02-28 01:29
Summary
Red Hat Security Advisory: httpd:2.4 security update
Notes
Topic
An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1080", "url": "https://access.redhat.com/errata/RHSA-2022:1080" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1080.json" } ], "title": "Red Hat Security Advisory: httpd:2.4 security update", "tracking": { "current_release_date": "2025-02-28T01:29:58+00:00", "generator": { "date": "2025-02-28T01:29:58+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.3.1" } }, "id": "RHSA-2022:1080", "initial_release_date": "2022-03-28T11:23:46+00:00", "revision_history": [ { "date": "2022-03-28T11:23:46+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-03-28T11:23:46+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-02-28T01:29:58+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:8.1::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd:2.4:8010020220321173048:c27ad7f8", "product": { "name": "httpd:2.4:8010020220321173048:c27ad7f8", "product_id": "httpd:2.4:8010020220321173048:c27ad7f8", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/httpd@2.4:8010020220321173048:c27ad7f8" } } }, { "category": "product_version", "name": "httpd-filesystem-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch", "product": { "name": "httpd-filesystem-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch", "product_id": "httpd-filesystem-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=noarch" } } }, { "category": "product_version", "name": "httpd-manual-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch", "product": { "name": "httpd-manual-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch", "product_id": "httpd-manual-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.src", "product": { "name": "httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.src", "product_id": "httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=src" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src", "product": { "name": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src", "product_id": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product": { "name": "httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_id": "httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_id": "httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product": { "name": "httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_id": "httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product": { "name": "httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_id": "httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product": { "name": "httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_id": "httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_id": "httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "product": { "name": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "product_id": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "product": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "product_id": "mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "product": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "product_id": "mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product": { "name": "mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_id": "mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_id": "mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product": { "name": "mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_id": "mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product": { "name": "mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_id": "mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_id": "mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product": { "name": "mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_id": "mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product": { "name": "mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_id": "mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product": { "name": "mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_id": "mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_id": "mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product": { "name": "httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_id": "httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_id": "httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product": { "name": "httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_id": "httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product": { "name": "httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_id": "httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product": { "name": "httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_id": "httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_id": "httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "product": { "name": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "product_id": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "product": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "product_id": "mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "product": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "product_id": "mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-3.module%2Bel8.1.0%2B7763%2Bbabdfe5b.1?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product": { "name": "mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_id": "mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_id": "mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product": { "name": "mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_id": "mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product": { "name": "mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_id": "mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product": { "name": "mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_id": "mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product": { "name": "mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_id": "mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product": { "name": "mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_id": "mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product": { "name": "mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_id": "mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_id": "mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-16.module%2Bel8.1.0%2B14533%2Bac5a4716.4?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, "product_reference": "httpd:2.4:8010020220321173048:c27ad7f8", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le" }, "product_reference": "httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.src as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.src" }, "product_reference": "httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.src", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" }, "product_reference": "httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le" }, "product_reference": "httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le" }, "product_reference": "httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-filesystem-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-manual-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch" }, "product_reference": "httpd-manual-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le" }, "product_reference": "httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le" }, "product_reference": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src" }, "product_reference": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64" }, "product_reference": "mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le" }, "product_reference": "mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le" }, "product_reference": "mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le" }, "product_reference": "mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le" }, "product_reference": "mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" }, "product_reference": "mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le" }, "product_reference": "mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" }, "product_reference": "mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le" }, "product_reference": "mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" }, "product_reference": "mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le" }, "product_reference": "mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le" }, "product_reference": "mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64 as a component of httpd:2.4:8010020220321173048:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-22720", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064321" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd. The inbound connection is not closed when it fails to discard the request body, which may expose the server to HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.src", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-filesystem-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-manual-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22720" }, { "category": "external", "summary": "RHBZ#2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-28T11:23:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.src", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-filesystem-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-manual-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1080" }, { "category": "workaround", "details": "There are currently no known mitigations for this issue.", "product_ids": [ "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.src", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-filesystem-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-manual-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.src", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-debugsource-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-devel-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-filesystem-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-manual-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.noarch", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:httpd-tools-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.src", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debuginfo-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_http2-debugsource-0:1.11.3-3.module+el8.1.0+7763+babdfe5b.1.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ldap-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_md-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_proxy_html-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_session-debuginfo-0:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.ppc64le", "AppStream-8.1.0.Z.E4S:httpd:2.4:8010020220321173048:c27ad7f8:mod_ssl-debuginfo-1:2.4.37-16.module+el8.1.0+14533+ac5a4716.4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling" } ] }
rhsa-2022:1045
Vulnerability from csaf_redhat
Published
2022-03-24 10:50
Modified
2025-02-28 01:29
Summary
Red Hat Security Advisory: httpd security update
Notes
Topic
An update for httpd is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for httpd is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1045", "url": "https://access.redhat.com/errata/RHSA-2022:1045" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1045.json" } ], "title": "Red Hat Security Advisory: httpd security update", "tracking": { "current_release_date": "2025-02-28T01:29:35+00:00", "generator": { "date": "2025-02-28T01:29:35+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.3.1" } }, "id": "RHSA-2022:1045", "initial_release_date": "2022-03-24T10:50:16+00:00", "revision_history": [ { "date": "2022-03-24T10:50:16+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-03-24T10:50:16+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-02-28T01:29:35+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-97.el7_9.5.src", "product": { "name": "httpd-0:2.4.6-97.el7_9.5.src", "product_id": "httpd-0:2.4.6-97.el7_9.5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-97.el7_9.5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-97.el7_9.5.x86_64", "product": { "name": "httpd-0:2.4.6-97.el7_9.5.x86_64", "product_id": "httpd-0:2.4.6-97.el7_9.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-97.el7_9.5?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "product": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "product_id": "httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-97.el7_9.5?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "product": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "product_id": "httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-97.el7_9.5?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "product": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "product_id": "mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-97.el7_9.5?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "product": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "product_id": "mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-97.el7_9.5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-97.el7_9.5.x86_64", "product": { "name": "mod_session-0:2.4.6-97.el7_9.5.x86_64", "product_id": "mod_session-0:2.4.6-97.el7_9.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-97.el7_9.5?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "product": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "product_id": "mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-97.el7_9.5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "product_id": "httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-97.el7_9.5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-manual-0:2.4.6-97.el7_9.5.noarch", "product": { "name": "httpd-manual-0:2.4.6-97.el7_9.5.noarch", "product_id": "httpd-manual-0:2.4.6-97.el7_9.5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-97.el7_9.5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-97.el7_9.5.ppc64le", "product": { "name": "httpd-0:2.4.6-97.el7_9.5.ppc64le", "product_id": "httpd-0:2.4.6-97.el7_9.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-97.el7_9.5?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "product": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "product_id": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-97.el7_9.5?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "product": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "product_id": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-97.el7_9.5?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-97.el7_9.5.ppc64le", "product": { "name": "mod_session-0:2.4.6-97.el7_9.5.ppc64le", "product_id": "mod_session-0:2.4.6-97.el7_9.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-97.el7_9.5?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "product": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "product_id": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-97.el7_9.5?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "product_id": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-97.el7_9.5?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "product": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "product_id": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-97.el7_9.5?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "product_id": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-97.el7_9.5?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-97.el7_9.5.ppc64", "product": { "name": "httpd-0:2.4.6-97.el7_9.5.ppc64", "product_id": "httpd-0:2.4.6-97.el7_9.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-97.el7_9.5?arch=ppc64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "product": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "product_id": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-97.el7_9.5?arch=ppc64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "product": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "product_id": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-97.el7_9.5?arch=ppc64" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-97.el7_9.5.ppc64", "product": { "name": "mod_session-0:2.4.6-97.el7_9.5.ppc64", "product_id": "mod_session-0:2.4.6-97.el7_9.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-97.el7_9.5?arch=ppc64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "product": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "product_id": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-97.el7_9.5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "product": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "product_id": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-97.el7_9.5?arch=ppc64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "product": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "product_id": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-97.el7_9.5?arch=ppc64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "product": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "product_id": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-97.el7_9.5?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-97.el7_9.5.s390x", "product": { "name": "httpd-0:2.4.6-97.el7_9.5.s390x", "product_id": "httpd-0:2.4.6-97.el7_9.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-97.el7_9.5?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-97.el7_9.5.s390x", "product": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.s390x", "product_id": "httpd-devel-0:2.4.6-97.el7_9.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-97.el7_9.5?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-97.el7_9.5.s390x", "product": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.s390x", "product_id": "httpd-tools-0:2.4.6-97.el7_9.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-97.el7_9.5?arch=s390x" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-97.el7_9.5.s390x", "product": { "name": "mod_session-0:2.4.6-97.el7_9.5.s390x", "product_id": "mod_session-0:2.4.6-97.el7_9.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-97.el7_9.5?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-97.el7_9.5.s390x", "product": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.s390x", "product_id": "mod_ssl-1:2.4.6-97.el7_9.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-97.el7_9.5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "product": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "product_id": "httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-97.el7_9.5?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-97.el7_9.5.s390x", "product": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.s390x", "product_id": "mod_ldap-0:2.4.6-97.el7_9.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-97.el7_9.5?arch=s390x" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "product": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "product_id": "mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-97.el7_9.5?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.src", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-97.el7_9.5.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch" }, "product_reference": "httpd-manual-0:2.4.6-97.el7_9.5.noarch", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.src", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-97.el7_9.5.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch" }, "product_reference": "httpd-manual-0:2.4.6-97.el7_9.5.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.src", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-97.el7_9.5.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch" }, "product_reference": "httpd-manual-0:2.4.6-97.el7_9.5.noarch", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.src", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-97.el7_9.5.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch" }, "product_reference": "httpd-manual-0:2.4.6-97.el7_9.5.noarch", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.src", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-97.el7_9.5.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch" }, "product_reference": "httpd-manual-0:2.4.6-97.el7_9.5.noarch", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.src", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-97.el7_9.5.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch" }, "product_reference": "httpd-manual-0:2.4.6-97.el7_9.5.noarch", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-22720", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064321" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd. The inbound connection is not closed when it fails to discard the request body, which may expose the server to HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22720" }, { "category": "external", "summary": "RHBZ#2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-24T10:50:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1045" }, { "category": "workaround", "details": "There are currently no known mitigations for this issue.", "product_ids": [ "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling" } ] }
rhsa-2022_1389
Vulnerability from csaf_redhat
Published
2022-04-20 19:44
Modified
2025-01-06 19:55
Summary
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP11 security update
Notes
Topic
Updated packages that provide Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 11, fix several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
This release adds the new Apache HTTP Server 2.4.37 Service Pack 11 packages that are part of the JBoss Core Services offering.
This release serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 10 and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes and enhancements included in this release.
Security Fix(es):
* jbcs-httpd24-httpd: httpd: HTTP request smuggling vulnerability in Apache HTTP Server 2.4.52 and earlier (CVE-2022-22720)
* libxml2: use-after-free in xmlXIncludeDoProcess() in xinclude.c (CVE-2021-3518)
* libxml2: heap-based buffer overflow in xmlEncodeEntitiesInternal() in entities.c (CVE-2021-3517)
* libxml2: use-after-free in xmlEncodeEntitiesInternal() in entities.c (CVE-2021-3516)
* libxml2: Exponential entity expansion attack bypasses all existing protection mechanisms (CVE-2021-3541)
* libxml2: NULL pointer dereference when post-validating mixed content parsed in recovery mode (CVE-2021-3537)
* libxml2: Use-after-free of ID and IDREF attributes (CVE-2022-23308)
* openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated packages that provide Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 11, fix several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This release adds the new Apache HTTP Server 2.4.37 Service Pack 11 packages that are part of the JBoss Core Services offering.\n\nThis release serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 10 and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* jbcs-httpd24-httpd: httpd: HTTP request smuggling vulnerability in Apache HTTP Server 2.4.52 and earlier (CVE-2022-22720)\n* libxml2: use-after-free in xmlXIncludeDoProcess() in xinclude.c (CVE-2021-3518)\n* libxml2: heap-based buffer overflow in xmlEncodeEntitiesInternal() in entities.c (CVE-2021-3517)\n* libxml2: use-after-free in xmlEncodeEntitiesInternal() in entities.c (CVE-2021-3516)\n* libxml2: Exponential entity expansion attack bypasses all existing protection mechanisms (CVE-2021-3541)\n* libxml2: NULL pointer dereference when post-validating mixed content parsed in recovery mode (CVE-2021-3537)\n* libxml2: Use-after-free of ID and IDREF attributes (CVE-2022-23308)\n* openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1389", "url": "https://access.redhat.com/errata/RHSA-2022:1389" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1950515", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1950515" }, { "category": "external", "summary": "1954225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954225" }, { "category": "external", "summary": "1954232", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954232" }, { "category": "external", "summary": "1954242", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954242" }, { "category": "external", "summary": "1956522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956522" }, { "category": "external", "summary": "2056913", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056913" }, { "category": "external", "summary": "2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "external", "summary": "2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1389.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP11 security update", "tracking": { "current_release_date": "2025-01-06T19:55:21+00:00", "generator": { "date": "2025-01-06T19:55:21+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.5" } }, "id": "RHSA-2022:1389", "initial_release_date": "2022-04-20T19:44:47+00:00", "revision_history": [ { "date": "2022-04-20T19:44:47+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-04-20T19:44:47+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-01-06T19:55:21+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Core Services on RHEL 7 Server", "product": { "name": "Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1::el7" } } }, { "category": "product_name", "name": "Red Hat JBoss Core Services on RHEL 8", "product": { "name": "Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1::el8" } } } ], "category": "product_family", "name": "Red Hat JBoss Core Services" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "product": { "name": "jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "product_id": "jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.1.1g-11.jbcs.el7?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "product": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "product_id": "jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-41.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "product": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "product_id": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11@0.4.10-26.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "product": { "name": "jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "product_id": "jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil@1.0.0-11.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "product": { "name": "jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "product_id": "jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-80.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-41.jbcs.el7?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-68.GA.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk@1.2.48-29.redhat_1.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.16-10.Final_redhat_2.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-22.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "product": { "name": "jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "product_id": "jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util@1.6.1-91.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "product": { "name": "jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "product_id": "jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl@7.78.0-3.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "product": { "name": "jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "product_id": "jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.1.1g-11.el8jbcs?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "product": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "product_id": "jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-41.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "product": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "product_id": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11@0.4.10-26.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "product": { "name": "jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "product_id": "jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil@1.0.0-11.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "product": { "name": "jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "product_id": "jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-80.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "product": { "name": "jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "product_id": "jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-41.el8jbcs?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "product_id": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-68.GA.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "product": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "product_id": "jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-22.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "product": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.16-10.Final_redhat_2.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "product": { "name": "jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "product_id": "jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk@1.2.48-29.redhat_1.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "product": { "name": "jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "product_id": "jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util@1.6.1-91.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "product": { "name": "jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "product_id": "jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl@7.78.0-3.el8jbcs?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.1.1g-11.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.1.1g-11.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.1.1g-11.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.1.1g-11.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.1.1g-11.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.1.1g-11.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-41.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-devel@1.39.2-41.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-debuginfo@1.39.2-41.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11@0.4.10-26.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11-debuginfo@0.4.10-26.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil@1.0.0-11.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil-debuginfo@1.0.0-11.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-80.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.37-80.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.37-80.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.37-80.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.37-80.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.37-80.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.37-80.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.37-80.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.37-80.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-41.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md-debuginfo@2.0.8-41.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-68.GA.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.2-68.GA.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24@1.2.48-29.redhat_1.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-manual@1.2.48-29.redhat_1.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-debuginfo@1.2.48-29.redhat_1.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.16-10.Final_redhat_2.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native-debuginfo@1.3.16-10.Final_redhat_2.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-22.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2-debuginfo@1.15.7-22.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util@1.6.1-91.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-devel@1.6.1-91.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-ldap@1.6.1-91.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-mysql@1.6.1-91.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-nss@1.6.1-91.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-odbc@1.6.1-91.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-openssl@1.6.1-91.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-pgsql@1.6.1-91.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-sqlite@1.6.1-91.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-debuginfo@1.6.1-91.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl@7.78.0-3.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl@7.78.0-3.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl-devel@7.78.0-3.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl-debuginfo@7.78.0-3.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.1.1g-11.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.1.1g-11.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.1.1g-11.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.1.1g-11.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.1.1g-11.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.1.1g-11.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs-debuginfo@1.1.1g-11.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "product_id": "jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-41.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "product_id": "jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-devel@1.39.2-41.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "product_id": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-debuginfo@1.39.2-41.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11@0.4.10-26.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11-debuginfo@0.4.10-26.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil@1.0.0-11.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil-debuginfo@1.0.0-11.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-80.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.37-80.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.37-80.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.37-80.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.37-80.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.37-80.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.37-80.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.37-80.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.37-80.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools-debuginfo@2.4.37-80.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap-debuginfo@2.4.37-80.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html-debuginfo@2.4.37-80.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session-debuginfo@2.4.37-80.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl-debuginfo@2.4.37-80.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-41.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md-debuginfo@2.0.8-41.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-68.GA.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.2-68.GA.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-22.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2-debuginfo@1.15.7-22.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.16-10.Final_redhat_2.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native-debuginfo@1.3.16-10.Final_redhat_2.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24@1.2.48-29.redhat_1.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-manual@1.2.48-29.redhat_1.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24-debuginfo@1.2.48-29.redhat_1.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-devel@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-ldap@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-mysql@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-nss@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-odbc@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-openssl@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-pgsql@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-sqlite@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-debuginfo@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-ldap-debuginfo@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-mysql-debuginfo@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-nss-debuginfo@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-odbc-debuginfo@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-openssl-debuginfo@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-pgsql-debuginfo@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-sqlite-debuginfo@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "product_id": "jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl@7.78.0-3.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "product_id": "jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl@7.78.0-3.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "product_id": "jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl-devel@7.78.0-3.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "product_id": "jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl-debuginfo@7.78.0-3.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "product_id": "jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl-debuginfo@7.78.0-3.el8jbcs?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "product": { "name": "jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "product_id": "jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.37-80.jbcs.el7?arch=noarch" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "product": { "name": "jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "product_id": "jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.37-80.el8jbcs?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch" }, "product_reference": "jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src" }, "product_reference": "jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src" }, "product_reference": "jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch" }, "product_reference": "jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src" }, "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src" }, "product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src" }, "product_reference": "jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src" }, "product_reference": "jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src" }, "product_reference": "jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src" }, "product_reference": "jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src" }, "product_reference": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "zodf0055980" ], "organization": "SQLab NCTU Taiwan" } ], "cve": "CVE-2021-3516", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-04-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1954225" } ], "notes": [ { "category": "description", "text": "There\u0027s a flaw in libxml2\u0027s xmllint. An attacker who is able to submit a crafted file to be processed by xmllint could trigger a use-after-free. The greatest impact of this flaw is to confidentiality, integrity, and availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Use-after-free in xmlEncodeEntitiesInternal() in entities.c", "title": "Vulnerability summary" }, { "category": "other", "text": "The only known exploitation path of this flaw is via the xmllint tool.\n\nThis flaw is out of support scope for Red Hat Enterprise Linux 6 and 7. To learn more about Red Hat Enterprise Linux support life cycles, please see https://access.redhat.com/support/policy/updates/errata .", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3516" }, { "category": "external", "summary": "RHBZ#1954225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954225" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3516", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3516" } ], "release_date": "2021-04-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:44:47+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1389" }, { "category": "workaround", "details": "This flaw can be mitigated by not using xmllint with the --html and --push options together.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Use-after-free in xmlEncodeEntitiesInternal() in entities.c" }, { "acknowledgments": [ { "names": [ "zodf0055980" ], "organization": "SQLab NCTU Taiwan" } ], "cve": "CVE-2021-3517", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-04-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1954232" } ], "notes": [ { "category": "description", "text": "There is a flaw in the xml entity encoding functionality of libxml2. An attacker who is able to supply a crafted file to be processed by an application linked with the affected functionality of libxml2 could trigger an out-of-bounds read. The most likely impact of this flaw is to application availability, with some potential impact to confidentiality and integrity if an attacker is able to use memory information to further exploit the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Heap-based buffer overflow in xmlEncodeEntitiesInternal() in entities.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is out of support scope for Red Hat Enterprise Linux 6 and 7. To learn more about Red Hat Enterprise Linux support life cycles, please see https://access.redhat.com/support/policy/updates/errata .", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3517" }, { "category": "external", "summary": "RHBZ#1954232", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954232" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3517", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3517" } ], "release_date": "2021-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:44:47+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1389" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Heap-based buffer overflow in xmlEncodeEntitiesInternal() in entities.c" }, { "acknowledgments": [ { "names": [ "zodf0055980" ], "organization": "SQLab NCTU Taiwan" } ], "cve": "CVE-2021-3518", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-04-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1954242" } ], "notes": [ { "category": "description", "text": "There\u0027s a flaw in libxml2. An attacker who is able to submit a crafted file to be processed by an application linked with libxml2 could trigger a use-after-free. The greatest impact from this flaw is to confidentiality, integrity, and availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Use-after-free in xmlXIncludeDoProcess() in xinclude.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is out of support scope for Red Hat Enterprise Linux 6 and 7. To learn more about Red Hat Enterprise Linux support life cycles, please see https://access.redhat.com/support/policy/updates/errata .", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3518" }, { "category": "external", "summary": "RHBZ#1954242", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954242" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3518", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3518" } ], "release_date": "2021-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:44:47+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1389" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Use-after-free in xmlXIncludeDoProcess() in xinclude.c" }, { "acknowledgments": [ { "names": [ "yuawn" ], "organization": "NSLab NTU Taiwan" } ], "cve": "CVE-2021-3537", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2021-05-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1956522" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in libxml2, where it did not propagate errors while parsing XML mixed content. This flaw causes the application to crash if an untrusted XML document is parsed in recovery mode and post validated. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: NULL pointer dereference when post-validating mixed content parsed in recovery mode", "title": "Vulnerability summary" }, { "category": "other", "text": "For the flaw to be exploitable, the document must be parsed in recovery mode and post validated (e.g.: when used in the `xmlling` tool, both `-recover` and `-postvalid` options must be used for the flaw to be exploitable)", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3537" }, { "category": "external", "summary": "RHBZ#1956522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956522" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3537", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3537" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3537", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3537" } ], "release_date": "2021-05-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:44:47+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1389" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: NULL pointer dereference when post-validating mixed content parsed in recovery mode" }, { "acknowledgments": [ { "names": [ "Sebastian Pipping" ] } ], "cve": "CVE-2021-3541", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1950515" } ], "notes": [ { "category": "description", "text": "A flaw was found in libxml2. Exponential entity expansion attack its possible bypassing all existing protection mechanisms and leading to denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Exponential entity expansion attack bypasses all existing protection mechanisms", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3541" }, { "category": "external", "summary": "RHBZ#1950515", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1950515" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3541", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3541" } ], "release_date": "2021-05-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:44:47+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1389" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Exponential entity expansion attack bypasses all existing protection mechanisms" }, { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2022-03-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2062202" } ], "notes": [ { "category": "description", "text": "A flaw was found in OpenSSL. It is possible to trigger an infinite loop by crafting a certificate that has invalid elliptic curve parameters. Since certificate parsing happens before verification of the certificate signature, any process that parses an externally supplied certificate may be subject to a denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates", "title": "Vulnerability summary" }, { "category": "other", "text": "While Red Hat initially stated not to be directly affected by this flaw, after further investigation we found that the versions of OpenSSL as shipped in Red Hat Enterprise Linux 6, 7, and 8 are vulnerable to a denial of service attack through malicious Elliptic Curve parameters. During processing of the parameters OpenSSL will call BN_mod_sqrt() with invalid arguments, causing the process to enter an infinite loop. The invalid EC parameters can be provided to OpenSSL through X.509 certificates (used in TLS connections), through public and private keys, through certificate signing requests and other places where applications process Elliptic Curve parameters. The flaw has been rated as having a security impact of Important. A future update will address this issue in Red Hat Enterprise Linux 6, 7 and 8.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0778" }, { "category": "external", "summary": "RHBZ#2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0778", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0778" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20220315.txt", "url": "https://www.openssl.org/news/secadv/20220315.txt" } ], "release_date": "2022-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:44:47+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1389" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates" }, { "cve": "CVE-2022-22720", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064321" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd. The inbound connection is not closed when it fails to discard the request body, which may expose the server to HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22720" }, { "category": "external", "summary": "RHBZ#2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:44:47+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1389" }, { "category": "workaround", "details": "There are currently no known mitigations for this issue.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling" }, { "cve": "CVE-2022-23308", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-02-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2056913" } ], "notes": [ { "category": "description", "text": "A flaw was found in libxml2. A call to the xmlGetID function can return a pointer already freed when parsing an XML document with the XML_PARSE_DTDVALID option and without the XML_PARSE_NOENT option, resulting in a use-after-free issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Use-after-free of ID and IDREF attributes", "title": "Vulnerability summary" }, { "category": "other", "text": "The security impact of xmlGetID() returning a pointer to freed memory depends on the application and will mostly result in a denial of service (DoS). The typical use case of calling xmlGetID() on an unmodified document is not affected, therefore this issue was rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23308" }, { "category": "external", "summary": "RHBZ#2056913", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056913" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23308", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23308" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23308", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23308" } ], "release_date": "2022-02-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:44:47+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1389" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Use-after-free of ID and IDREF attributes" } ] }
rhsa-2022:1138
Vulnerability from csaf_redhat
Published
2022-04-01 22:24
Modified
2025-02-28 01:33
Summary
Red Hat Security Advisory: httpd security update
Notes
Topic
An update for httpd is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_lua: Possible buffer overflow when parsing multipart content (CVE-2021-44790)
* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for httpd is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: mod_lua: Possible buffer overflow when parsing multipart content (CVE-2021-44790)\n\n* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1138", "url": "https://access.redhat.com/errata/RHSA-2022:1138" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2034674", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034674" }, { "category": "external", "summary": "2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1138.json" } ], "title": "Red Hat Security Advisory: httpd security update", "tracking": { "current_release_date": "2025-02-28T01:33:25+00:00", "generator": { "date": "2025-02-28T01:33:25+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.3.1" } }, "id": "RHSA-2022:1138", "initial_release_date": "2022-04-01T22:24:31+00:00", "revision_history": [ { "date": "2022-04-01T22:24:31+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-04-01T22:24:31+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-02-28T01:33:25+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.4::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.4::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-67.el7_4.9.src", "product": { "name": "httpd-0:2.4.6-67.el7_4.9.src", "product_id": "httpd-0:2.4.6-67.el7_4.9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-67.el7_4.9?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-67.el7_4.9.x86_64", "product": { "name": "httpd-0:2.4.6-67.el7_4.9.x86_64", "product_id": "httpd-0:2.4.6-67.el7_4.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-67.el7_4.9?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "product": { "name": "httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "product_id": "httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-67.el7_4.9?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "product": { "name": "httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "product_id": "httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-67.el7_4.9?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-67.el7_4.9.x86_64", "product": { "name": "mod_session-0:2.4.6-67.el7_4.9.x86_64", "product_id": "mod_session-0:2.4.6-67.el7_4.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-67.el7_4.9?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-67.el7_4.9.x86_64", "product": { "name": "mod_ssl-1:2.4.6-67.el7_4.9.x86_64", "product_id": "mod_ssl-1:2.4.6-67.el7_4.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-67.el7_4.9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "product_id": "httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-67.el7_4.9?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "product": { "name": "mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "product_id": "mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-67.el7_4.9?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "product": { "name": "mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "product_id": "mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-67.el7_4.9?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-manual-0:2.4.6-67.el7_4.9.noarch", "product": { "name": "httpd-manual-0:2.4.6-67.el7_4.9.noarch", "product_id": "httpd-manual-0:2.4.6-67.el7_4.9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-67.el7_4.9?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-67.el7_4.9.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src" }, "product_reference": "httpd-0:2.4.6-67.el7_4.9.src", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-67.el7_4.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64" }, "product_reference": "httpd-0:2.4.6-67.el7_4.9.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-67.el7_4.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-67.el7_4.9.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch" }, "product_reference": "httpd-manual-0:2.4.6-67.el7_4.9.noarch", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-67.el7_4.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-67.el7_4.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-67.el7_4.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64" }, "product_reference": "mod_session-0:2.4.6-67.el7_4.9.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-67.el7_4.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-67.el7_4.9.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-67.el7_4.9.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src" }, "product_reference": "httpd-0:2.4.6-67.el7_4.9.src", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-67.el7_4.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64" }, "product_reference": "httpd-0:2.4.6-67.el7_4.9.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-67.el7_4.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-67.el7_4.9.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch" }, "product_reference": "httpd-manual-0:2.4.6-67.el7_4.9.noarch", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-67.el7_4.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-67.el7_4.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-67.el7_4.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64" }, "product_reference": "mod_session-0:2.4.6-67.el7_4.9.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-67.el7_4.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-67.el7_4.9.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-44790", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034674" } ], "notes": [ { "category": "description", "text": "A buffer overflow flaw in httpd\u0027s lua module could allow an out-of-bounds write. An attacker who is able to submit a crafted request to an httpd instance that is using the lua module may be able to cause an impact to confidentiality, integrity, and/or availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_lua: Possible buffer overflow when parsing multipart content", "title": "Vulnerability summary" }, { "category": "other", "text": "httpd as shipped in Red Hat Enterprise Linux 6 is NOT affected by this flaw because it does not ship mod_lua.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src", "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch", "7Server-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src", "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch", "7Server-optional-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-44790" }, { "category": "external", "summary": "RHBZ#2034674", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034674" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44790", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44790" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44790", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44790" }, { "category": "external", "summary": "http://httpd.apache.org/security/vulnerabilities_24.html", "url": "http://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-01T22:24:31+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src", "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch", "7Server-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src", "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch", "7Server-optional-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1138" }, { "category": "workaround", "details": "Disabling mod_lua and restarting httpd will mitigate this flaw. See https://access.redhat.com/articles/10649 for more information.", "product_ids": [ "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src", "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch", "7Server-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src", "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch", "7Server-optional-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src", "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch", "7Server-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src", "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch", "7Server-optional-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: mod_lua: Possible buffer overflow when parsing multipart content" }, { "cve": "CVE-2022-22720", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064321" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd. The inbound connection is not closed when it fails to discard the request body, which may expose the server to HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src", "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch", "7Server-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src", "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch", "7Server-optional-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22720" }, { "category": "external", "summary": "RHBZ#2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-01T22:24:31+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src", "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch", "7Server-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src", "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch", "7Server-optional-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1138" }, { "category": "workaround", "details": "There are currently no known mitigations for this issue.", "product_ids": [ "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src", "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch", "7Server-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src", "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch", "7Server-optional-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src", "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch", "7Server-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src", "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch", "7Server-optional-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling" } ] }
RHSA-2022:1390
Vulnerability from csaf_redhat
Published
2022-04-20 19:30
Modified
2025-02-28 01:34
Summary
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP11 security update
Notes
Topic
Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 11 zip release for Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 8, and Microsoft Windows is available.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.
This release adds the new Apache HTTP Server 2.4.37 Service Pack 11 packages that are part of the JBoss Core Services offering.
This release serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 10 and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes and enhancements included in this release.
Security Fix(es):
* jbcs-httpd24-httpd: httpd: HTTP request smuggling vulnerability in Apache HTTP Server 2.4.52 and earlier (CVE-2022-22720)
* libxml2: use-after-free in xmlXIncludeDoProcess() in xinclude.c (CVE-2021-3518)
* libxml2: heap-based buffer overflow in xmlEncodeEntitiesInternal() in entities.c (CVE-2021-3517)
* libxml2: use-after-free in xmlEncodeEntitiesInternal() in entities.c (CVE-2021-3516)
* libxml2: Exponential entity expansion attack bypasses all existing protection mechanisms (CVE-2021-3541)
* libxml2: NULL pointer dereference when post-validating mixed content parsed in recovery mode (CVE-2021-3537)
* libxml2: Use-after-free of ID and IDREF attributes (CVE-2022-23308)
* openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 11 zip release for Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 8, and Microsoft Windows is available.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.\n\nThis release adds the new Apache HTTP Server 2.4.37 Service Pack 11 packages that are part of the JBoss Core Services offering.\n\nThis release serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 10 and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* jbcs-httpd24-httpd: httpd: HTTP request smuggling vulnerability in Apache HTTP Server 2.4.52 and earlier (CVE-2022-22720)\n* libxml2: use-after-free in xmlXIncludeDoProcess() in xinclude.c (CVE-2021-3518)\n* libxml2: heap-based buffer overflow in xmlEncodeEntitiesInternal() in entities.c (CVE-2021-3517)\n* libxml2: use-after-free in xmlEncodeEntitiesInternal() in entities.c (CVE-2021-3516)\n* libxml2: Exponential entity expansion attack bypasses all existing protection mechanisms (CVE-2021-3541)\n* libxml2: NULL pointer dereference when post-validating mixed content parsed in recovery mode (CVE-2021-3537)\n* libxml2: Use-after-free of ID and IDREF attributes (CVE-2022-23308)\n* openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1390", "url": "https://access.redhat.com/errata/RHSA-2022:1390" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1950515", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1950515" }, { "category": "external", "summary": "1954225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954225" }, { "category": "external", "summary": "1954232", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954232" }, { "category": "external", "summary": "1954242", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954242" }, { "category": "external", "summary": "1956522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956522" }, { "category": "external", "summary": "2056913", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056913" }, { "category": "external", "summary": "2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "external", "summary": "2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1390.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP11 security update", "tracking": { "current_release_date": "2025-02-28T01:34:28+00:00", "generator": { "date": "2025-02-28T01:34:28+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.3.1" } }, "id": "RHSA-2022:1390", "initial_release_date": "2022-04-20T19:30:18+00:00", "revision_history": [ { "date": "2022-04-20T19:30:18+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-04-20T19:30:18+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-02-28T01:34:28+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Text-Only JBCS", "product": { "name": "Text-Only JBCS", "product_id": "Text-Only JBCS", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1" } } } ], "category": "product_family", "name": "Red Hat JBoss Core Services" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "zodf0055980" ], "organization": "SQLab NCTU Taiwan" } ], "cve": "CVE-2021-3516", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-04-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1954225" } ], "notes": [ { "category": "description", "text": "There\u0027s a flaw in libxml2\u0027s xmllint. An attacker who is able to submit a crafted file to be processed by xmllint could trigger a use-after-free. The greatest impact of this flaw is to confidentiality, integrity, and availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Use-after-free in xmlEncodeEntitiesInternal() in entities.c", "title": "Vulnerability summary" }, { "category": "other", "text": "The only known exploitation path of this flaw is via the xmllint tool.\n\nThis flaw is out of support scope for Red Hat Enterprise Linux 6 and 7. To learn more about Red Hat Enterprise Linux support life cycles, please see https://access.redhat.com/support/policy/updates/errata .", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only JBCS" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3516" }, { "category": "external", "summary": "RHBZ#1954225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954225" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3516", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3516" } ], "release_date": "2021-04-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:30:18+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only JBCS" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1390" }, { "category": "workaround", "details": "This flaw can be mitigated by not using xmllint with the --html and --push options together.", "product_ids": [ "Text-Only JBCS" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only JBCS" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Use-after-free in xmlEncodeEntitiesInternal() in entities.c" }, { "acknowledgments": [ { "names": [ "zodf0055980" ], "organization": "SQLab NCTU Taiwan" } ], "cve": "CVE-2021-3517", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-04-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1954232" } ], "notes": [ { "category": "description", "text": "There is a flaw in the xml entity encoding functionality of libxml2. An attacker who is able to supply a crafted file to be processed by an application linked with the affected functionality of libxml2 could trigger an out-of-bounds read. The most likely impact of this flaw is to application availability, with some potential impact to confidentiality and integrity if an attacker is able to use memory information to further exploit the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Heap-based buffer overflow in xmlEncodeEntitiesInternal() in entities.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is out of support scope for Red Hat Enterprise Linux 6 and 7. To learn more about Red Hat Enterprise Linux support life cycles, please see https://access.redhat.com/support/policy/updates/errata .", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only JBCS" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3517" }, { "category": "external", "summary": "RHBZ#1954232", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954232" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3517", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3517" } ], "release_date": "2021-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:30:18+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only JBCS" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1390" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "Text-Only JBCS" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Heap-based buffer overflow in xmlEncodeEntitiesInternal() in entities.c" }, { "acknowledgments": [ { "names": [ "zodf0055980" ], "organization": "SQLab NCTU Taiwan" } ], "cve": "CVE-2021-3518", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-04-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1954242" } ], "notes": [ { "category": "description", "text": "There\u0027s a flaw in libxml2. An attacker who is able to submit a crafted file to be processed by an application linked with libxml2 could trigger a use-after-free. The greatest impact from this flaw is to confidentiality, integrity, and availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Use-after-free in xmlXIncludeDoProcess() in xinclude.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is out of support scope for Red Hat Enterprise Linux 6 and 7. To learn more about Red Hat Enterprise Linux support life cycles, please see https://access.redhat.com/support/policy/updates/errata .", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only JBCS" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3518" }, { "category": "external", "summary": "RHBZ#1954242", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954242" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3518", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3518" } ], "release_date": "2021-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:30:18+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only JBCS" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1390" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "Text-Only JBCS" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Use-after-free in xmlXIncludeDoProcess() in xinclude.c" }, { "acknowledgments": [ { "names": [ "yuawn" ], "organization": "NSLab NTU Taiwan" } ], "cve": "CVE-2021-3537", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2021-05-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1956522" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in libxml2, where it did not propagate errors while parsing XML mixed content. This flaw causes the application to crash if an untrusted XML document is parsed in recovery mode and post validated. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: NULL pointer dereference when post-validating mixed content parsed in recovery mode", "title": "Vulnerability summary" }, { "category": "other", "text": "For the flaw to be exploitable, the document must be parsed in recovery mode and post validated (e.g.: when used in the `xmlling` tool, both `-recover` and `-postvalid` options must be used for the flaw to be exploitable)", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only JBCS" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3537" }, { "category": "external", "summary": "RHBZ#1956522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956522" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3537", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3537" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3537", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3537" } ], "release_date": "2021-05-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:30:18+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only JBCS" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1390" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Text-Only JBCS" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: NULL pointer dereference when post-validating mixed content parsed in recovery mode" }, { "acknowledgments": [ { "names": [ "Sebastian Pipping" ] } ], "cve": "CVE-2021-3541", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1950515" } ], "notes": [ { "category": "description", "text": "A flaw was found in libxml2. Exponential entity expansion attack its possible bypassing all existing protection mechanisms and leading to denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Exponential entity expansion attack bypasses all existing protection mechanisms", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only JBCS" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3541" }, { "category": "external", "summary": "RHBZ#1950515", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1950515" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3541", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3541" } ], "release_date": "2021-05-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:30:18+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only JBCS" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1390" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Text-Only JBCS" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Exponential entity expansion attack bypasses all existing protection mechanisms" }, { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2022-03-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2062202" } ], "notes": [ { "category": "description", "text": "A flaw was found in OpenSSL. It is possible to trigger an infinite loop by crafting a certificate that has invalid elliptic curve parameters. Since certificate parsing happens before verification of the certificate signature, any process that parses an externally supplied certificate may be subject to a denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates", "title": "Vulnerability summary" }, { "category": "other", "text": "While Red Hat initially stated not to be directly affected by this flaw, after further investigation we found that the versions of OpenSSL as shipped in Red Hat Enterprise Linux 6, 7, and 8 are vulnerable to a denial of service attack through malicious Elliptic Curve parameters. During processing of the parameters OpenSSL will call BN_mod_sqrt() with invalid arguments, causing the process to enter an infinite loop. The invalid EC parameters can be provided to OpenSSL through X.509 certificates (used in TLS connections), through public and private keys, through certificate signing requests and other places where applications process Elliptic Curve parameters. The flaw has been rated as having a security impact of Important. A future update will address this issue in Red Hat Enterprise Linux 6, 7 and 8.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only JBCS" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0778" }, { "category": "external", "summary": "RHBZ#2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0778", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0778" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20220315.txt", "url": "https://www.openssl.org/news/secadv/20220315.txt" } ], "release_date": "2022-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:30:18+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only JBCS" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1390" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "Text-Only JBCS" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Text-Only JBCS" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates" }, { "cve": "CVE-2022-22720", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064321" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd. The inbound connection is not closed when it fails to discard the request body, which may expose the server to HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only JBCS" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22720" }, { "category": "external", "summary": "RHBZ#2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:30:18+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only JBCS" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1390" }, { "category": "workaround", "details": "There are currently no known mitigations for this issue.", "product_ids": [ "Text-Only JBCS" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "Text-Only JBCS" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling" }, { "cve": "CVE-2022-23308", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-02-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2056913" } ], "notes": [ { "category": "description", "text": "A flaw was found in libxml2. A call to the xmlGetID function can return a pointer already freed when parsing an XML document with the XML_PARSE_DTDVALID option and without the XML_PARSE_NOENT option, resulting in a use-after-free issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Use-after-free of ID and IDREF attributes", "title": "Vulnerability summary" }, { "category": "other", "text": "The security impact of xmlGetID() returning a pointer to freed memory depends on the application and will mostly result in a denial of service (DoS). The typical use case of calling xmlGetID() on an unmodified document is not affected, therefore this issue was rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only JBCS" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23308" }, { "category": "external", "summary": "RHBZ#2056913", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056913" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23308", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23308" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23308", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23308" } ], "release_date": "2022-02-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:30:18+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only JBCS" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1390" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only JBCS" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Use-after-free of ID and IDREF attributes" } ] }
RHSA-2022:1139
Vulnerability from csaf_redhat
Published
2022-04-01 22:26
Modified
2025-02-28 01:33
Summary
Red Hat Security Advisory: httpd security update
Notes
Topic
An update for httpd is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_lua: Possible buffer overflow when parsing multipart content (CVE-2021-44790)
* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for httpd is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: mod_lua: Possible buffer overflow when parsing multipart content (CVE-2021-44790)\n\n* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1139", "url": "https://access.redhat.com/errata/RHSA-2022:1139" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2034674", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034674" }, { "category": "external", "summary": "2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1139.json" } ], "title": "Red Hat Security Advisory: httpd security update", "tracking": { "current_release_date": "2025-02-28T01:33:33+00:00", "generator": { "date": "2025-02-28T01:33:33+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.3.1" } }, "id": "RHSA-2022:1139", "initial_release_date": "2022-04-01T22:26:42+00:00", "revision_history": [ { "date": "2022-04-01T22:26:42+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-04-01T22:26:42+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-02-28T01:33:33+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 7.3)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.3::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.3::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-45.el7_3.8.src", "product": { "name": "httpd-0:2.4.6-45.el7_3.8.src", "product_id": "httpd-0:2.4.6-45.el7_3.8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-45.el7_3.8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-45.el7_3.8.x86_64", "product": { "name": "httpd-0:2.4.6-45.el7_3.8.x86_64", "product_id": "httpd-0:2.4.6-45.el7_3.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-45.el7_3.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "product": { "name": "httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "product_id": "httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-45.el7_3.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "product": { "name": "httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "product_id": "httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-45.el7_3.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-45.el7_3.8.x86_64", "product": { "name": "mod_ssl-1:2.4.6-45.el7_3.8.x86_64", "product_id": "mod_ssl-1:2.4.6-45.el7_3.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-45.el7_3.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "product_id": "httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-45.el7_3.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "product": { "name": "mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "product_id": "mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-45.el7_3.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "product": { "name": "mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "product_id": "mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-45.el7_3.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-45.el7_3.8.x86_64", "product": { "name": "mod_session-0:2.4.6-45.el7_3.8.x86_64", "product_id": "mod_session-0:2.4.6-45.el7_3.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-45.el7_3.8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-manual-0:2.4.6-45.el7_3.8.noarch", "product": { "name": "httpd-manual-0:2.4.6-45.el7_3.8.noarch", "product_id": "httpd-manual-0:2.4.6-45.el7_3.8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-45.el7_3.8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-45.el7_3.8.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src" }, "product_reference": "httpd-0:2.4.6-45.el7_3.8.src", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-45.el7_3.8.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64" }, "product_reference": "httpd-0:2.4.6-45.el7_3.8.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-45.el7_3.8.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-45.el7_3.8.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch" }, "product_reference": "httpd-manual-0:2.4.6-45.el7_3.8.noarch", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-45.el7_3.8.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-45.el7_3.8.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-45.el7_3.8.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64" }, "product_reference": "mod_session-0:2.4.6-45.el7_3.8.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-45.el7_3.8.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)", "product_id": "7Server-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-45.el7_3.8.x86_64", "relates_to_product_reference": "7Server-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-45.el7_3.8.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src" }, "product_reference": "httpd-0:2.4.6-45.el7_3.8.src", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-45.el7_3.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64" }, "product_reference": "httpd-0:2.4.6-45.el7_3.8.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-45.el7_3.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-45.el7_3.8.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch" }, "product_reference": "httpd-manual-0:2.4.6-45.el7_3.8.noarch", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-45.el7_3.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-45.el7_3.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-45.el7_3.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64" }, "product_reference": "mod_session-0:2.4.6-45.el7_3.8.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-45.el7_3.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)", "product_id": "7Server-optional-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-45.el7_3.8.x86_64", "relates_to_product_reference": "7Server-optional-7.3.AUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-44790", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034674" } ], "notes": [ { "category": "description", "text": "A buffer overflow flaw in httpd\u0027s lua module could allow an out-of-bounds write. An attacker who is able to submit a crafted request to an httpd instance that is using the lua module may be able to cause an impact to confidentiality, integrity, and/or availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_lua: Possible buffer overflow when parsing multipart content", "title": "Vulnerability summary" }, { "category": "other", "text": "httpd as shipped in Red Hat Enterprise Linux 6 is NOT affected by this flaw because it does not ship mod_lua.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src", "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch", "7Server-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src", "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch", "7Server-optional-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-44790" }, { "category": "external", "summary": "RHBZ#2034674", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034674" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44790", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44790" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44790", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44790" }, { "category": "external", "summary": "http://httpd.apache.org/security/vulnerabilities_24.html", "url": "http://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-01T22:26:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src", "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch", "7Server-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src", "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch", "7Server-optional-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1139" }, { "category": "workaround", "details": "Disabling mod_lua and restarting httpd will mitigate this flaw. See https://access.redhat.com/articles/10649 for more information.", "product_ids": [ "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src", "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch", "7Server-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src", "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch", "7Server-optional-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src", "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch", "7Server-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src", "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch", "7Server-optional-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: mod_lua: Possible buffer overflow when parsing multipart content" }, { "cve": "CVE-2022-22720", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064321" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd. The inbound connection is not closed when it fails to discard the request body, which may expose the server to HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src", "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch", "7Server-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src", "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch", "7Server-optional-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22720" }, { "category": "external", "summary": "RHBZ#2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-01T22:26:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src", "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch", "7Server-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src", "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch", "7Server-optional-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1139" }, { "category": "workaround", "details": "There are currently no known mitigations for this issue.", "product_ids": [ "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src", "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch", "7Server-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src", "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch", "7Server-optional-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src", "7Server-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch", "7Server-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64", "7Server-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.src", "7Server-optional-7.3.AUS:httpd-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-debuginfo-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-devel-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:httpd-manual-0:2.4.6-45.el7_3.8.noarch", "7Server-optional-7.3.AUS:httpd-tools-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_ldap-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_proxy_html-1:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_session-0:2.4.6-45.el7_3.8.x86_64", "7Server-optional-7.3.AUS:mod_ssl-1:2.4.6-45.el7_3.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling" } ] }
rhsa-2022:1049
Vulnerability from csaf_redhat
Published
2022-03-24 11:24
Modified
2025-05-19 17:31
Summary
Red Hat Security Advisory: httpd:2.4 security update
Notes
Topic
An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1049", "url": "https://access.redhat.com/errata/RHSA-2022:1049" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1049.json" } ], "title": "Red Hat Security Advisory: httpd:2.4 security update", "tracking": { "current_release_date": "2025-05-19T17:31:14+00:00", "generator": { "date": "2025-05-19T17:31:14+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.5.1" } }, "id": "RHSA-2022:1049", "initial_release_date": "2022-03-24T11:24:58+00:00", "revision_history": [ { "date": "2022-03-24T11:24:58+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-03-24T11:24:58+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-05-19T17:31:14+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd:2.4:8050020220321170448:c5368500", "product": { "name": "httpd:2.4:8050020220321170448:c5368500", "product_id": "httpd:2.4:8050020220321170448:c5368500", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/httpd@2.4:8050020220321170448:c5368500" } } }, { "category": "product_version", "name": "httpd-filesystem-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch", "product": { "name": "httpd-filesystem-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch", "product_id": "httpd-filesystem-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=noarch" } } }, { "category": "product_version", "name": "httpd-manual-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch", "product": { "name": "httpd-manual-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch", "product_id": "httpd-manual-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product": { "name": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_id": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product": { "name": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_id": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product": { "name": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_id": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product": { "name": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_id": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product": { "name": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_id": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_id": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product_id": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product_id": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product_id": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product": { "name": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_id": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_id": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=aarch64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product": { "name": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_id": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product": { "name": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_id": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=aarch64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product": { "name": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_id": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product": { "name": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_id": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_id": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.src", "product": { "name": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.src", "product_id": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=src" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src", "product": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src", "product_id": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=src" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product": { "name": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_id": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_id": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product": { "name": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_id": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product": { "name": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_id": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product": { "name": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_id": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_id": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product_id": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product_id": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product_id": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product": { "name": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_id": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_id": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_id": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product": { "name": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_id": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product": { "name": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_id": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product": { "name": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_id": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_id": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product": { "name": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_id": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product": { "name": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_id": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product": { "name": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_id": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product": { "name": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_id": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product": { "name": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_id": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_id": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product_id": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product_id": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product_id": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product": { "name": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_id": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_id": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=s390x" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product": { "name": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_id": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product": { "name": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_id": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=s390x" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product": { "name": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_id": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product": { "name": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_id": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_id": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product": { "name": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_id": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_id": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product": { "name": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_id": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product": { "name": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_id": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product": { "name": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_id": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_id": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product_id": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product_id": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product_id": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product": { "name": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_id": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_id": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product": { "name": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_id": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product": { "name": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_id": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product": { "name": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_id": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product": { "name": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_id": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_id": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, "product_reference": "httpd:2.4:8050020220321170448:c5368500", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64" }, "product_reference": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le" }, "product_reference": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x" }, "product_reference": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.src as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.src" }, "product_reference": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.src", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" }, "product_reference": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64" }, "product_reference": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64" }, "product_reference": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le" }, "product_reference": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x" }, "product_reference": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64" }, "product_reference": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le" }, "product_reference": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x" }, "product_reference": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-filesystem-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-manual-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch" }, "product_reference": "httpd-manual-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64" }, "product_reference": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le" }, "product_reference": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x" }, "product_reference": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le" }, "product_reference": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x" }, "product_reference": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64" }, "product_reference": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le" }, "product_reference": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x" }, "product_reference": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64" }, "product_reference": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x" }, "product_reference": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64" }, "product_reference": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le" }, "product_reference": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x" }, "product_reference": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" }, "product_reference": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le" }, "product_reference": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x" }, "product_reference": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64" }, "product_reference": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le" }, "product_reference": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x" }, "product_reference": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-22720", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064321" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd. The inbound connection is not closed when it fails to discard the request body, which may expose the server to HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.src", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-filesystem-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-manual-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22720" }, { "category": "external", "summary": "RHBZ#2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-24T11:24:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.src", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-filesystem-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-manual-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1049" }, { "category": "workaround", "details": "There are currently no known mitigations for this issue.", "product_ids": [ "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.src", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-filesystem-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-manual-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.src", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-filesystem-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-manual-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling" } ] }
RHSA-2022:1173
Vulnerability from csaf_redhat
Published
2022-04-04 09:26
Modified
2025-02-28 01:30
Summary
Red Hat Security Advisory: httpd security update
Notes
Topic
An update for httpd is now available for Red Hat Enterprise Linux 6 Extended Lifecycle Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for httpd is now available for Red Hat Enterprise Linux 6 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1173", "url": "https://access.redhat.com/errata/RHSA-2022:1173" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1173.json" } ], "title": "Red Hat Security Advisory: httpd security update", "tracking": { "current_release_date": "2025-02-28T01:30:04+00:00", "generator": { "date": "2025-02-28T01:30:04+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.3.1" } }, "id": "RHSA-2022:1173", "initial_release_date": "2022-04-04T09:26:39+00:00", "revision_history": [ { "date": "2022-04-04T09:26:39+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-04-04T09:26:39+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-02-28T01:30:04+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6 ELS)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_els:6" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.2.15-70.el6_10.src", "product": { "name": "httpd-0:2.2.15-70.el6_10.src", "product_id": "httpd-0:2.2.15-70.el6_10.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.15-70.el6_10?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.2.15-70.el6_10.x86_64", "product": { "name": "httpd-0:2.2.15-70.el6_10.x86_64", "product_id": "httpd-0:2.2.15-70.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.15-70.el6_10?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.15-70.el6_10.x86_64", "product": { "name": "httpd-devel-0:2.2.15-70.el6_10.x86_64", "product_id": "httpd-devel-0:2.2.15-70.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-70.el6_10?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.2.15-70.el6_10.x86_64", "product": { "name": "httpd-tools-0:2.2.15-70.el6_10.x86_64", "product_id": "httpd-tools-0:2.2.15-70.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.2.15-70.el6_10?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.2.15-70.el6_10.x86_64", "product": { "name": "mod_ssl-1:2.2.15-70.el6_10.x86_64", "product_id": "mod_ssl-1:2.2.15-70.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.15-70.el6_10?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.2.15-70.el6_10.x86_64", "product": { "name": "httpd-debuginfo-0:2.2.15-70.el6_10.x86_64", "product_id": "httpd-debuginfo-0:2.2.15-70.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-70.el6_10?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-devel-0:2.2.15-70.el6_10.i686", "product": { "name": "httpd-devel-0:2.2.15-70.el6_10.i686", "product_id": "httpd-devel-0:2.2.15-70.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-70.el6_10?arch=i686" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.2.15-70.el6_10.i686", "product": { "name": "httpd-debuginfo-0:2.2.15-70.el6_10.i686", "product_id": "httpd-debuginfo-0:2.2.15-70.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-70.el6_10?arch=i686" } } }, { "category": "product_version", "name": "httpd-0:2.2.15-70.el6_10.i686", "product": { "name": "httpd-0:2.2.15-70.el6_10.i686", "product_id": "httpd-0:2.2.15-70.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.15-70.el6_10?arch=i686" } } }, { "category": "product_version", "name": "httpd-tools-0:2.2.15-70.el6_10.i686", "product": { "name": "httpd-tools-0:2.2.15-70.el6_10.i686", "product_id": "httpd-tools-0:2.2.15-70.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.2.15-70.el6_10?arch=i686" } } }, { "category": "product_version", "name": "mod_ssl-1:2.2.15-70.el6_10.i686", "product": { "name": "mod_ssl-1:2.2.15-70.el6_10.i686", "product_id": "mod_ssl-1:2.2.15-70.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.15-70.el6_10?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.2.15-70.el6_10.s390x", "product": { "name": "httpd-0:2.2.15-70.el6_10.s390x", "product_id": "httpd-0:2.2.15-70.el6_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.15-70.el6_10?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.15-70.el6_10.s390x", "product": { "name": "httpd-devel-0:2.2.15-70.el6_10.s390x", "product_id": "httpd-devel-0:2.2.15-70.el6_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-70.el6_10?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-0:2.2.15-70.el6_10.s390x", "product": { "name": "httpd-tools-0:2.2.15-70.el6_10.s390x", "product_id": "httpd-tools-0:2.2.15-70.el6_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.2.15-70.el6_10?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.2.15-70.el6_10.s390x", "product": { "name": "mod_ssl-1:2.2.15-70.el6_10.s390x", "product_id": "mod_ssl-1:2.2.15-70.el6_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.15-70.el6_10?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.2.15-70.el6_10.s390x", "product": { "name": "httpd-debuginfo-0:2.2.15-70.el6_10.s390x", "product_id": "httpd-debuginfo-0:2.2.15-70.el6_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-70.el6_10?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-devel-0:2.2.15-70.el6_10.s390", "product": { "name": "httpd-devel-0:2.2.15-70.el6_10.s390", "product_id": "httpd-devel-0:2.2.15-70.el6_10.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-70.el6_10?arch=s390" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.2.15-70.el6_10.s390", "product": { "name": "httpd-debuginfo-0:2.2.15-70.el6_10.s390", "product_id": "httpd-debuginfo-0:2.2.15-70.el6_10.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-70.el6_10?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "httpd-manual-0:2.2.15-70.el6_10.noarch", "product": { "name": "httpd-manual-0:2.2.15-70.el6_10.noarch", "product_id": "httpd-manual-0:2.2.15-70.el6_10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.2.15-70.el6_10?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-70.el6_10.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:httpd-0:2.2.15-70.el6_10.i686" }, "product_reference": "httpd-0:2.2.15-70.el6_10.i686", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-70.el6_10.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:httpd-0:2.2.15-70.el6_10.s390x" }, "product_reference": "httpd-0:2.2.15-70.el6_10.s390x", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-70.el6_10.src as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:httpd-0:2.2.15-70.el6_10.src" }, "product_reference": "httpd-0:2.2.15-70.el6_10.src", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-70.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:httpd-0:2.2.15-70.el6_10.x86_64" }, "product_reference": "httpd-0:2.2.15-70.el6_10.x86_64", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-70.el6_10.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.i686" }, "product_reference": "httpd-debuginfo-0:2.2.15-70.el6_10.i686", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-70.el6_10.s390 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.s390" }, "product_reference": "httpd-debuginfo-0:2.2.15-70.el6_10.s390", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-70.el6_10.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.s390x" }, "product_reference": "httpd-debuginfo-0:2.2.15-70.el6_10.s390x", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-70.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.x86_64" }, "product_reference": "httpd-debuginfo-0:2.2.15-70.el6_10.x86_64", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-70.el6_10.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.i686" }, "product_reference": "httpd-devel-0:2.2.15-70.el6_10.i686", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-70.el6_10.s390 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.s390" }, "product_reference": "httpd-devel-0:2.2.15-70.el6_10.s390", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-70.el6_10.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.s390x" }, "product_reference": "httpd-devel-0:2.2.15-70.el6_10.s390x", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-70.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.x86_64" }, "product_reference": "httpd-devel-0:2.2.15-70.el6_10.x86_64", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.15-70.el6_10.noarch as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:httpd-manual-0:2.2.15-70.el6_10.noarch" }, "product_reference": "httpd-manual-0:2.2.15-70.el6_10.noarch", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-70.el6_10.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:httpd-tools-0:2.2.15-70.el6_10.i686" }, "product_reference": "httpd-tools-0:2.2.15-70.el6_10.i686", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-70.el6_10.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:httpd-tools-0:2.2.15-70.el6_10.s390x" }, "product_reference": "httpd-tools-0:2.2.15-70.el6_10.s390x", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-70.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:httpd-tools-0:2.2.15-70.el6_10.x86_64" }, "product_reference": "httpd-tools-0:2.2.15-70.el6_10.x86_64", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-70.el6_10.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:mod_ssl-1:2.2.15-70.el6_10.i686" }, "product_reference": "mod_ssl-1:2.2.15-70.el6_10.i686", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-70.el6_10.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:mod_ssl-1:2.2.15-70.el6_10.s390x" }, "product_reference": "mod_ssl-1:2.2.15-70.el6_10.s390x", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-70.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:mod_ssl-1:2.2.15-70.el6_10.x86_64" }, "product_reference": "mod_ssl-1:2.2.15-70.el6_10.x86_64", "relates_to_product_reference": "6Server-ELS" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-22720", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064321" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd. The inbound connection is not closed when it fails to discard the request body, which may expose the server to HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-ELS:httpd-0:2.2.15-70.el6_10.i686", "6Server-ELS:httpd-0:2.2.15-70.el6_10.s390x", "6Server-ELS:httpd-0:2.2.15-70.el6_10.src", "6Server-ELS:httpd-0:2.2.15-70.el6_10.x86_64", "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.i686", "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.s390", "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.s390x", "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.x86_64", "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.i686", "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.s390", "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.s390x", "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.x86_64", "6Server-ELS:httpd-manual-0:2.2.15-70.el6_10.noarch", "6Server-ELS:httpd-tools-0:2.2.15-70.el6_10.i686", "6Server-ELS:httpd-tools-0:2.2.15-70.el6_10.s390x", "6Server-ELS:httpd-tools-0:2.2.15-70.el6_10.x86_64", "6Server-ELS:mod_ssl-1:2.2.15-70.el6_10.i686", "6Server-ELS:mod_ssl-1:2.2.15-70.el6_10.s390x", "6Server-ELS:mod_ssl-1:2.2.15-70.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22720" }, { "category": "external", "summary": "RHBZ#2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-04T09:26:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-ELS:httpd-0:2.2.15-70.el6_10.i686", "6Server-ELS:httpd-0:2.2.15-70.el6_10.s390x", "6Server-ELS:httpd-0:2.2.15-70.el6_10.src", "6Server-ELS:httpd-0:2.2.15-70.el6_10.x86_64", "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.i686", "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.s390", "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.s390x", "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.x86_64", "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.i686", "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.s390", "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.s390x", "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.x86_64", "6Server-ELS:httpd-manual-0:2.2.15-70.el6_10.noarch", "6Server-ELS:httpd-tools-0:2.2.15-70.el6_10.i686", "6Server-ELS:httpd-tools-0:2.2.15-70.el6_10.s390x", "6Server-ELS:httpd-tools-0:2.2.15-70.el6_10.x86_64", "6Server-ELS:mod_ssl-1:2.2.15-70.el6_10.i686", "6Server-ELS:mod_ssl-1:2.2.15-70.el6_10.s390x", "6Server-ELS:mod_ssl-1:2.2.15-70.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1173" }, { "category": "workaround", "details": "There are currently no known mitigations for this issue.", "product_ids": [ "6Server-ELS:httpd-0:2.2.15-70.el6_10.i686", "6Server-ELS:httpd-0:2.2.15-70.el6_10.s390x", "6Server-ELS:httpd-0:2.2.15-70.el6_10.src", "6Server-ELS:httpd-0:2.2.15-70.el6_10.x86_64", "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.i686", "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.s390", "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.s390x", "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.x86_64", "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.i686", "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.s390", "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.s390x", "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.x86_64", "6Server-ELS:httpd-manual-0:2.2.15-70.el6_10.noarch", "6Server-ELS:httpd-tools-0:2.2.15-70.el6_10.i686", "6Server-ELS:httpd-tools-0:2.2.15-70.el6_10.s390x", "6Server-ELS:httpd-tools-0:2.2.15-70.el6_10.x86_64", "6Server-ELS:mod_ssl-1:2.2.15-70.el6_10.i686", "6Server-ELS:mod_ssl-1:2.2.15-70.el6_10.s390x", "6Server-ELS:mod_ssl-1:2.2.15-70.el6_10.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "6Server-ELS:httpd-0:2.2.15-70.el6_10.i686", "6Server-ELS:httpd-0:2.2.15-70.el6_10.s390x", "6Server-ELS:httpd-0:2.2.15-70.el6_10.src", "6Server-ELS:httpd-0:2.2.15-70.el6_10.x86_64", "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.i686", "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.s390", "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.s390x", "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.x86_64", "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.i686", "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.s390", "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.s390x", "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.x86_64", "6Server-ELS:httpd-manual-0:2.2.15-70.el6_10.noarch", "6Server-ELS:httpd-tools-0:2.2.15-70.el6_10.i686", "6Server-ELS:httpd-tools-0:2.2.15-70.el6_10.s390x", "6Server-ELS:httpd-tools-0:2.2.15-70.el6_10.x86_64", "6Server-ELS:mod_ssl-1:2.2.15-70.el6_10.i686", "6Server-ELS:mod_ssl-1:2.2.15-70.el6_10.s390x", "6Server-ELS:mod_ssl-1:2.2.15-70.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling" } ] }
rhsa-2022_1173
Vulnerability from csaf_redhat
Published
2022-04-04 09:26
Modified
2024-11-15 14:46
Summary
Red Hat Security Advisory: httpd security update
Notes
Topic
An update for httpd is now available for Red Hat Enterprise Linux 6 Extended Lifecycle Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for httpd is now available for Red Hat Enterprise Linux 6 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1173", "url": "https://access.redhat.com/errata/RHSA-2022:1173" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1173.json" } ], "title": "Red Hat Security Advisory: httpd security update", "tracking": { "current_release_date": "2024-11-15T14:46:32+00:00", "generator": { "date": "2024-11-15T14:46:32+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:1173", "initial_release_date": "2022-04-04T09:26:39+00:00", "revision_history": [ { "date": "2022-04-04T09:26:39+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-04-04T09:26:39+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T14:46:32+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6 ELS)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_els:6" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.2.15-70.el6_10.src", "product": { "name": "httpd-0:2.2.15-70.el6_10.src", "product_id": "httpd-0:2.2.15-70.el6_10.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.15-70.el6_10?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.2.15-70.el6_10.x86_64", "product": { "name": "httpd-0:2.2.15-70.el6_10.x86_64", "product_id": "httpd-0:2.2.15-70.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.15-70.el6_10?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.15-70.el6_10.x86_64", "product": { "name": "httpd-devel-0:2.2.15-70.el6_10.x86_64", "product_id": "httpd-devel-0:2.2.15-70.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-70.el6_10?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.2.15-70.el6_10.x86_64", "product": { "name": "httpd-tools-0:2.2.15-70.el6_10.x86_64", "product_id": "httpd-tools-0:2.2.15-70.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.2.15-70.el6_10?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.2.15-70.el6_10.x86_64", "product": { "name": "mod_ssl-1:2.2.15-70.el6_10.x86_64", "product_id": "mod_ssl-1:2.2.15-70.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.15-70.el6_10?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.2.15-70.el6_10.x86_64", "product": { "name": "httpd-debuginfo-0:2.2.15-70.el6_10.x86_64", "product_id": "httpd-debuginfo-0:2.2.15-70.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-70.el6_10?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-devel-0:2.2.15-70.el6_10.i686", "product": { "name": "httpd-devel-0:2.2.15-70.el6_10.i686", "product_id": "httpd-devel-0:2.2.15-70.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-70.el6_10?arch=i686" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.2.15-70.el6_10.i686", "product": { "name": "httpd-debuginfo-0:2.2.15-70.el6_10.i686", "product_id": "httpd-debuginfo-0:2.2.15-70.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-70.el6_10?arch=i686" } } }, { "category": "product_version", "name": "httpd-0:2.2.15-70.el6_10.i686", "product": { "name": "httpd-0:2.2.15-70.el6_10.i686", "product_id": "httpd-0:2.2.15-70.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.15-70.el6_10?arch=i686" } } }, { "category": "product_version", "name": "httpd-tools-0:2.2.15-70.el6_10.i686", "product": { "name": "httpd-tools-0:2.2.15-70.el6_10.i686", "product_id": "httpd-tools-0:2.2.15-70.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.2.15-70.el6_10?arch=i686" } } }, { "category": "product_version", "name": "mod_ssl-1:2.2.15-70.el6_10.i686", "product": { "name": "mod_ssl-1:2.2.15-70.el6_10.i686", "product_id": "mod_ssl-1:2.2.15-70.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.15-70.el6_10?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.2.15-70.el6_10.s390x", "product": { "name": "httpd-0:2.2.15-70.el6_10.s390x", "product_id": "httpd-0:2.2.15-70.el6_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.15-70.el6_10?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.15-70.el6_10.s390x", "product": { "name": "httpd-devel-0:2.2.15-70.el6_10.s390x", "product_id": "httpd-devel-0:2.2.15-70.el6_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-70.el6_10?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-0:2.2.15-70.el6_10.s390x", "product": { "name": "httpd-tools-0:2.2.15-70.el6_10.s390x", "product_id": "httpd-tools-0:2.2.15-70.el6_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.2.15-70.el6_10?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.2.15-70.el6_10.s390x", "product": { "name": "mod_ssl-1:2.2.15-70.el6_10.s390x", "product_id": "mod_ssl-1:2.2.15-70.el6_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.15-70.el6_10?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.2.15-70.el6_10.s390x", "product": { "name": "httpd-debuginfo-0:2.2.15-70.el6_10.s390x", "product_id": "httpd-debuginfo-0:2.2.15-70.el6_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-70.el6_10?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-devel-0:2.2.15-70.el6_10.s390", "product": { "name": "httpd-devel-0:2.2.15-70.el6_10.s390", "product_id": "httpd-devel-0:2.2.15-70.el6_10.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-70.el6_10?arch=s390" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.2.15-70.el6_10.s390", "product": { "name": "httpd-debuginfo-0:2.2.15-70.el6_10.s390", "product_id": "httpd-debuginfo-0:2.2.15-70.el6_10.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-70.el6_10?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "httpd-manual-0:2.2.15-70.el6_10.noarch", "product": { "name": "httpd-manual-0:2.2.15-70.el6_10.noarch", "product_id": "httpd-manual-0:2.2.15-70.el6_10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.2.15-70.el6_10?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-70.el6_10.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:httpd-0:2.2.15-70.el6_10.i686" }, "product_reference": "httpd-0:2.2.15-70.el6_10.i686", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-70.el6_10.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:httpd-0:2.2.15-70.el6_10.s390x" }, "product_reference": "httpd-0:2.2.15-70.el6_10.s390x", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-70.el6_10.src as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:httpd-0:2.2.15-70.el6_10.src" }, "product_reference": "httpd-0:2.2.15-70.el6_10.src", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-70.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:httpd-0:2.2.15-70.el6_10.x86_64" }, "product_reference": "httpd-0:2.2.15-70.el6_10.x86_64", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-70.el6_10.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.i686" }, "product_reference": "httpd-debuginfo-0:2.2.15-70.el6_10.i686", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-70.el6_10.s390 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.s390" }, "product_reference": "httpd-debuginfo-0:2.2.15-70.el6_10.s390", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-70.el6_10.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.s390x" }, "product_reference": "httpd-debuginfo-0:2.2.15-70.el6_10.s390x", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-70.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.x86_64" }, "product_reference": "httpd-debuginfo-0:2.2.15-70.el6_10.x86_64", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-70.el6_10.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.i686" }, "product_reference": "httpd-devel-0:2.2.15-70.el6_10.i686", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-70.el6_10.s390 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.s390" }, "product_reference": "httpd-devel-0:2.2.15-70.el6_10.s390", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-70.el6_10.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.s390x" }, "product_reference": "httpd-devel-0:2.2.15-70.el6_10.s390x", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-70.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.x86_64" }, "product_reference": "httpd-devel-0:2.2.15-70.el6_10.x86_64", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.15-70.el6_10.noarch as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:httpd-manual-0:2.2.15-70.el6_10.noarch" }, "product_reference": "httpd-manual-0:2.2.15-70.el6_10.noarch", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-70.el6_10.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:httpd-tools-0:2.2.15-70.el6_10.i686" }, "product_reference": "httpd-tools-0:2.2.15-70.el6_10.i686", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-70.el6_10.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:httpd-tools-0:2.2.15-70.el6_10.s390x" }, "product_reference": "httpd-tools-0:2.2.15-70.el6_10.s390x", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-70.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:httpd-tools-0:2.2.15-70.el6_10.x86_64" }, "product_reference": "httpd-tools-0:2.2.15-70.el6_10.x86_64", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-70.el6_10.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:mod_ssl-1:2.2.15-70.el6_10.i686" }, "product_reference": "mod_ssl-1:2.2.15-70.el6_10.i686", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-70.el6_10.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:mod_ssl-1:2.2.15-70.el6_10.s390x" }, "product_reference": "mod_ssl-1:2.2.15-70.el6_10.s390x", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-70.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:mod_ssl-1:2.2.15-70.el6_10.x86_64" }, "product_reference": "mod_ssl-1:2.2.15-70.el6_10.x86_64", "relates_to_product_reference": "6Server-ELS" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-22720", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064321" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd. The inbound connection is not closed when it fails to discard the request body, which may expose the server to HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-ELS:httpd-0:2.2.15-70.el6_10.i686", "6Server-ELS:httpd-0:2.2.15-70.el6_10.s390x", "6Server-ELS:httpd-0:2.2.15-70.el6_10.src", "6Server-ELS:httpd-0:2.2.15-70.el6_10.x86_64", "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.i686", "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.s390", "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.s390x", "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.x86_64", "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.i686", "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.s390", "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.s390x", "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.x86_64", "6Server-ELS:httpd-manual-0:2.2.15-70.el6_10.noarch", "6Server-ELS:httpd-tools-0:2.2.15-70.el6_10.i686", "6Server-ELS:httpd-tools-0:2.2.15-70.el6_10.s390x", "6Server-ELS:httpd-tools-0:2.2.15-70.el6_10.x86_64", "6Server-ELS:mod_ssl-1:2.2.15-70.el6_10.i686", "6Server-ELS:mod_ssl-1:2.2.15-70.el6_10.s390x", "6Server-ELS:mod_ssl-1:2.2.15-70.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22720" }, { "category": "external", "summary": "RHBZ#2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-04T09:26:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-ELS:httpd-0:2.2.15-70.el6_10.i686", "6Server-ELS:httpd-0:2.2.15-70.el6_10.s390x", "6Server-ELS:httpd-0:2.2.15-70.el6_10.src", "6Server-ELS:httpd-0:2.2.15-70.el6_10.x86_64", "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.i686", "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.s390", "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.s390x", "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.x86_64", "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.i686", "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.s390", "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.s390x", "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.x86_64", "6Server-ELS:httpd-manual-0:2.2.15-70.el6_10.noarch", "6Server-ELS:httpd-tools-0:2.2.15-70.el6_10.i686", "6Server-ELS:httpd-tools-0:2.2.15-70.el6_10.s390x", "6Server-ELS:httpd-tools-0:2.2.15-70.el6_10.x86_64", "6Server-ELS:mod_ssl-1:2.2.15-70.el6_10.i686", "6Server-ELS:mod_ssl-1:2.2.15-70.el6_10.s390x", "6Server-ELS:mod_ssl-1:2.2.15-70.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1173" }, { "category": "workaround", "details": "There are currently no known mitigations for this issue.", "product_ids": [ "6Server-ELS:httpd-0:2.2.15-70.el6_10.i686", "6Server-ELS:httpd-0:2.2.15-70.el6_10.s390x", "6Server-ELS:httpd-0:2.2.15-70.el6_10.src", "6Server-ELS:httpd-0:2.2.15-70.el6_10.x86_64", "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.i686", "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.s390", "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.s390x", "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.x86_64", "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.i686", "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.s390", "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.s390x", "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.x86_64", "6Server-ELS:httpd-manual-0:2.2.15-70.el6_10.noarch", "6Server-ELS:httpd-tools-0:2.2.15-70.el6_10.i686", "6Server-ELS:httpd-tools-0:2.2.15-70.el6_10.s390x", "6Server-ELS:httpd-tools-0:2.2.15-70.el6_10.x86_64", "6Server-ELS:mod_ssl-1:2.2.15-70.el6_10.i686", "6Server-ELS:mod_ssl-1:2.2.15-70.el6_10.s390x", "6Server-ELS:mod_ssl-1:2.2.15-70.el6_10.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "6Server-ELS:httpd-0:2.2.15-70.el6_10.i686", "6Server-ELS:httpd-0:2.2.15-70.el6_10.s390x", "6Server-ELS:httpd-0:2.2.15-70.el6_10.src", "6Server-ELS:httpd-0:2.2.15-70.el6_10.x86_64", "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.i686", "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.s390", "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.s390x", "6Server-ELS:httpd-debuginfo-0:2.2.15-70.el6_10.x86_64", "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.i686", "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.s390", "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.s390x", "6Server-ELS:httpd-devel-0:2.2.15-70.el6_10.x86_64", "6Server-ELS:httpd-manual-0:2.2.15-70.el6_10.noarch", "6Server-ELS:httpd-tools-0:2.2.15-70.el6_10.i686", "6Server-ELS:httpd-tools-0:2.2.15-70.el6_10.s390x", "6Server-ELS:httpd-tools-0:2.2.15-70.el6_10.x86_64", "6Server-ELS:mod_ssl-1:2.2.15-70.el6_10.i686", "6Server-ELS:mod_ssl-1:2.2.15-70.el6_10.s390x", "6Server-ELS:mod_ssl-1:2.2.15-70.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling" } ] }
RHSA-2022:1075
Vulnerability from csaf_redhat
Published
2022-03-28 10:15
Modified
2025-03-19 16:06
Summary
Red Hat Security Advisory: httpd24-httpd security update
Notes
Topic
An update for httpd24-httpd is now available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for httpd24-httpd is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1075", "url": "https://access.redhat.com/errata/RHSA-2022:1075" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1075.json" } ], "title": "Red Hat Security Advisory: httpd24-httpd security update", "tracking": { "current_release_date": "2025-03-19T16:06:35+00:00", "generator": { "date": "2025-03-19T16:06:35+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2022:1075", "initial_release_date": "2022-03-28T10:15:14+00:00", "revision_history": [ { "date": "2022-03-28T10:15:14+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-03-28T10:15:14+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-19T16:06:35+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Software Collections for RHEL Workstation(v. 7)", "product": { "name": "Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for RHEL(v. 7)", "product": { "name": "Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } } ], "category": "product_family", "name": "Red Hat Software Collections" }, { "branches": [ { "category": "product_version", "name": "httpd24-httpd-0:2.4.34-23.el7.2.src", "product": { "name": "httpd24-httpd-0:2.4.34-23.el7.2.src", "product_id": "httpd24-httpd-0:2.4.34-23.el7.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.34-23.el7.2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd24-httpd-0:2.4.34-23.el7.2.x86_64", "product": { "name": "httpd24-httpd-0:2.4.34-23.el7.2.x86_64", "product_id": "httpd24-httpd-0:2.4.34-23.el7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.34-23.el7.2?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-httpd-devel-0:2.4.34-23.el7.2.x86_64", "product": { "name": "httpd24-httpd-devel-0:2.4.34-23.el7.2.x86_64", "product_id": "httpd24-httpd-devel-0:2.4.34-23.el7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-devel@2.4.34-23.el7.2?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-httpd-tools-0:2.4.34-23.el7.2.x86_64", "product": { "name": "httpd24-httpd-tools-0:2.4.34-23.el7.2.x86_64", "product_id": "httpd24-httpd-tools-0:2.4.34-23.el7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-tools@2.4.34-23.el7.2?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-mod_ldap-0:2.4.34-23.el7.2.x86_64", "product": { "name": "httpd24-mod_ldap-0:2.4.34-23.el7.2.x86_64", "product_id": "httpd24-mod_ldap-0:2.4.34-23.el7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_ldap@2.4.34-23.el7.2?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.x86_64", "product": { "name": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.x86_64", "product_id": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.34-23.el7.2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd24-mod_session-0:2.4.34-23.el7.2.x86_64", "product": { "name": "httpd24-mod_session-0:2.4.34-23.el7.2.x86_64", "product_id": "httpd24-mod_session-0:2.4.34-23.el7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_session@2.4.34-23.el7.2?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-mod_ssl-1:2.4.34-23.el7.2.x86_64", "product": { "name": "httpd24-mod_ssl-1:2.4.34-23.el7.2.x86_64", "product_id": "httpd24-mod_ssl-1:2.4.34-23.el7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_ssl@2.4.34-23.el7.2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.x86_64", "product": { "name": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.x86_64", "product_id": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.34-23.el7.2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd24-httpd-manual-0:2.4.34-23.el7.2.noarch", "product": { "name": "httpd24-httpd-manual-0:2.4.34-23.el7.2.noarch", "product_id": "httpd24-httpd-manual-0:2.4.34-23.el7.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-manual@2.4.34-23.el7.2?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd24-httpd-0:2.4.34-23.el7.2.s390x", "product": { "name": "httpd24-httpd-0:2.4.34-23.el7.2.s390x", "product_id": "httpd24-httpd-0:2.4.34-23.el7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.34-23.el7.2?arch=s390x" } } }, { "category": "product_version", "name": "httpd24-httpd-devel-0:2.4.34-23.el7.2.s390x", "product": { "name": "httpd24-httpd-devel-0:2.4.34-23.el7.2.s390x", "product_id": "httpd24-httpd-devel-0:2.4.34-23.el7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-devel@2.4.34-23.el7.2?arch=s390x" } } }, { "category": "product_version", "name": "httpd24-httpd-tools-0:2.4.34-23.el7.2.s390x", "product": { "name": "httpd24-httpd-tools-0:2.4.34-23.el7.2.s390x", "product_id": "httpd24-httpd-tools-0:2.4.34-23.el7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-tools@2.4.34-23.el7.2?arch=s390x" } } }, { "category": "product_version", "name": "httpd24-mod_ldap-0:2.4.34-23.el7.2.s390x", "product": { "name": "httpd24-mod_ldap-0:2.4.34-23.el7.2.s390x", "product_id": "httpd24-mod_ldap-0:2.4.34-23.el7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_ldap@2.4.34-23.el7.2?arch=s390x" } } }, { "category": "product_version", "name": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.s390x", "product": { "name": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.s390x", "product_id": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.34-23.el7.2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd24-mod_session-0:2.4.34-23.el7.2.s390x", "product": { "name": "httpd24-mod_session-0:2.4.34-23.el7.2.s390x", "product_id": "httpd24-mod_session-0:2.4.34-23.el7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_session@2.4.34-23.el7.2?arch=s390x" } } }, { "category": "product_version", "name": "httpd24-mod_ssl-1:2.4.34-23.el7.2.s390x", "product": { "name": "httpd24-mod_ssl-1:2.4.34-23.el7.2.s390x", "product_id": "httpd24-mod_ssl-1:2.4.34-23.el7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_ssl@2.4.34-23.el7.2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.s390x", "product": { "name": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.s390x", "product_id": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.34-23.el7.2?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd24-httpd-0:2.4.34-23.el7.2.ppc64le", "product": { "name": "httpd24-httpd-0:2.4.34-23.el7.2.ppc64le", "product_id": "httpd24-httpd-0:2.4.34-23.el7.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.34-23.el7.2?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd24-httpd-devel-0:2.4.34-23.el7.2.ppc64le", "product": { "name": "httpd24-httpd-devel-0:2.4.34-23.el7.2.ppc64le", "product_id": "httpd24-httpd-devel-0:2.4.34-23.el7.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-devel@2.4.34-23.el7.2?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd24-httpd-tools-0:2.4.34-23.el7.2.ppc64le", "product": { "name": "httpd24-httpd-tools-0:2.4.34-23.el7.2.ppc64le", "product_id": "httpd24-httpd-tools-0:2.4.34-23.el7.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-tools@2.4.34-23.el7.2?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd24-mod_ldap-0:2.4.34-23.el7.2.ppc64le", "product": { "name": "httpd24-mod_ldap-0:2.4.34-23.el7.2.ppc64le", "product_id": "httpd24-mod_ldap-0:2.4.34-23.el7.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_ldap@2.4.34-23.el7.2?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.ppc64le", "product": { "name": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.ppc64le", "product_id": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.34-23.el7.2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd24-mod_session-0:2.4.34-23.el7.2.ppc64le", "product": { "name": "httpd24-mod_session-0:2.4.34-23.el7.2.ppc64le", "product_id": "httpd24-mod_session-0:2.4.34-23.el7.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_session@2.4.34-23.el7.2?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd24-mod_ssl-1:2.4.34-23.el7.2.ppc64le", "product": { "name": "httpd24-mod_ssl-1:2.4.34-23.el7.2.ppc64le", "product_id": "httpd24-mod_ssl-1:2.4.34-23.el7.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_ssl@2.4.34-23.el7.2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.ppc64le", "product": { "name": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.ppc64le", "product_id": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.34-23.el7.2?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-23.el7.2.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.ppc64le" }, "product_reference": "httpd24-httpd-0:2.4.34-23.el7.2.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-23.el7.2.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.s390x" }, "product_reference": "httpd24-httpd-0:2.4.34-23.el7.2.s390x", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-23.el7.2.src as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.src" }, "product_reference": "httpd24-httpd-0:2.4.34-23.el7.2.src", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-23.el7.2.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.x86_64" }, "product_reference": "httpd24-httpd-0:2.4.34-23.el7.2.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.ppc64le" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.s390x" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.s390x", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.x86_64" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.34-23.el7.2.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.ppc64le" }, "product_reference": "httpd24-httpd-devel-0:2.4.34-23.el7.2.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.34-23.el7.2.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.s390x" }, "product_reference": "httpd24-httpd-devel-0:2.4.34-23.el7.2.s390x", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.34-23.el7.2.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.x86_64" }, "product_reference": "httpd24-httpd-devel-0:2.4.34-23.el7.2.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-manual-0:2.4.34-23.el7.2.noarch as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.2.noarch" }, "product_reference": "httpd24-httpd-manual-0:2.4.34-23.el7.2.noarch", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.34-23.el7.2.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.ppc64le" }, "product_reference": "httpd24-httpd-tools-0:2.4.34-23.el7.2.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.34-23.el7.2.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.s390x" }, "product_reference": "httpd24-httpd-tools-0:2.4.34-23.el7.2.s390x", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.34-23.el7.2.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.x86_64" }, "product_reference": "httpd24-httpd-tools-0:2.4.34-23.el7.2.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.34-23.el7.2.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.ppc64le" }, "product_reference": "httpd24-mod_ldap-0:2.4.34-23.el7.2.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.34-23.el7.2.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.s390x" }, "product_reference": "httpd24-mod_ldap-0:2.4.34-23.el7.2.s390x", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.34-23.el7.2.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.x86_64" }, "product_reference": "httpd24-mod_ldap-0:2.4.34-23.el7.2.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.ppc64le" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.s390x" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.s390x", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.x86_64" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.34-23.el7.2.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.ppc64le" }, "product_reference": "httpd24-mod_session-0:2.4.34-23.el7.2.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.34-23.el7.2.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.s390x" }, "product_reference": "httpd24-mod_session-0:2.4.34-23.el7.2.s390x", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.34-23.el7.2.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.x86_64" }, "product_reference": "httpd24-mod_session-0:2.4.34-23.el7.2.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.34-23.el7.2.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.ppc64le" }, "product_reference": "httpd24-mod_ssl-1:2.4.34-23.el7.2.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.34-23.el7.2.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.s390x" }, "product_reference": "httpd24-mod_ssl-1:2.4.34-23.el7.2.s390x", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.34-23.el7.2.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.x86_64" }, "product_reference": "httpd24-mod_ssl-1:2.4.34-23.el7.2.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-23.el7.2.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.ppc64le" }, "product_reference": "httpd24-httpd-0:2.4.34-23.el7.2.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-23.el7.2.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.s390x" }, "product_reference": "httpd24-httpd-0:2.4.34-23.el7.2.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-23.el7.2.src as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.src" }, "product_reference": "httpd24-httpd-0:2.4.34-23.el7.2.src", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-23.el7.2.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.x86_64" }, "product_reference": "httpd24-httpd-0:2.4.34-23.el7.2.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.ppc64le" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.s390x" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.x86_64" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.34-23.el7.2.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.ppc64le" }, "product_reference": "httpd24-httpd-devel-0:2.4.34-23.el7.2.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.34-23.el7.2.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.s390x" }, "product_reference": "httpd24-httpd-devel-0:2.4.34-23.el7.2.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.34-23.el7.2.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.x86_64" }, "product_reference": "httpd24-httpd-devel-0:2.4.34-23.el7.2.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-manual-0:2.4.34-23.el7.2.noarch as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.2.noarch" }, "product_reference": "httpd24-httpd-manual-0:2.4.34-23.el7.2.noarch", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.34-23.el7.2.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.ppc64le" }, "product_reference": "httpd24-httpd-tools-0:2.4.34-23.el7.2.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.34-23.el7.2.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.s390x" }, "product_reference": "httpd24-httpd-tools-0:2.4.34-23.el7.2.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.34-23.el7.2.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.x86_64" }, "product_reference": "httpd24-httpd-tools-0:2.4.34-23.el7.2.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.34-23.el7.2.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.ppc64le" }, "product_reference": "httpd24-mod_ldap-0:2.4.34-23.el7.2.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.34-23.el7.2.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.s390x" }, "product_reference": "httpd24-mod_ldap-0:2.4.34-23.el7.2.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.34-23.el7.2.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.x86_64" }, "product_reference": "httpd24-mod_ldap-0:2.4.34-23.el7.2.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.ppc64le" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.s390x" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.x86_64" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.34-23.el7.2.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.34-23.el7.2.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.ppc64le" }, "product_reference": "httpd24-mod_session-0:2.4.34-23.el7.2.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.34-23.el7.2.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.s390x" }, "product_reference": "httpd24-mod_session-0:2.4.34-23.el7.2.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.34-23.el7.2.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.x86_64" }, "product_reference": "httpd24-mod_session-0:2.4.34-23.el7.2.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.34-23.el7.2.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.ppc64le" }, "product_reference": "httpd24-mod_ssl-1:2.4.34-23.el7.2.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.34-23.el7.2.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.s390x" }, "product_reference": "httpd24-mod_ssl-1:2.4.34-23.el7.2.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.34-23.el7.2.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.x86_64" }, "product_reference": "httpd24-mod_ssl-1:2.4.34-23.el7.2.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.8" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-22720", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064321" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd. The inbound connection is not closed when it fails to discard the request body, which may expose the server to HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.2.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.2.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22720" }, { "category": "external", "summary": "RHBZ#2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-28T10:15:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.2.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.2.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1075" }, { "category": "workaround", "details": "There are currently no known mitigations for this issue.", "product_ids": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.2.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.2.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.2.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.2.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.2.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling" } ] }
rhsa-2022_1045
Vulnerability from csaf_redhat
Published
2022-03-24 10:50
Modified
2024-11-15 14:45
Summary
Red Hat Security Advisory: httpd security update
Notes
Topic
An update for httpd is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for httpd is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1045", "url": "https://access.redhat.com/errata/RHSA-2022:1045" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1045.json" } ], "title": "Red Hat Security Advisory: httpd security update", "tracking": { "current_release_date": "2024-11-15T14:45:46+00:00", "generator": { "date": "2024-11-15T14:45:46+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:1045", "initial_release_date": "2022-03-24T10:50:16+00:00", "revision_history": [ { "date": "2022-03-24T10:50:16+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-03-24T10:50:16+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T14:45:46+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-97.el7_9.5.src", "product": { "name": "httpd-0:2.4.6-97.el7_9.5.src", "product_id": "httpd-0:2.4.6-97.el7_9.5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-97.el7_9.5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-97.el7_9.5.x86_64", "product": { "name": "httpd-0:2.4.6-97.el7_9.5.x86_64", "product_id": "httpd-0:2.4.6-97.el7_9.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-97.el7_9.5?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "product": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "product_id": "httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-97.el7_9.5?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "product": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "product_id": "httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-97.el7_9.5?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "product": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "product_id": "mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-97.el7_9.5?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "product": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "product_id": "mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-97.el7_9.5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-97.el7_9.5.x86_64", "product": { "name": "mod_session-0:2.4.6-97.el7_9.5.x86_64", "product_id": "mod_session-0:2.4.6-97.el7_9.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-97.el7_9.5?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "product": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "product_id": "mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-97.el7_9.5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "product_id": "httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-97.el7_9.5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-manual-0:2.4.6-97.el7_9.5.noarch", "product": { "name": "httpd-manual-0:2.4.6-97.el7_9.5.noarch", "product_id": "httpd-manual-0:2.4.6-97.el7_9.5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-97.el7_9.5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-97.el7_9.5.ppc64le", "product": { "name": "httpd-0:2.4.6-97.el7_9.5.ppc64le", "product_id": "httpd-0:2.4.6-97.el7_9.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-97.el7_9.5?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "product": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "product_id": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-97.el7_9.5?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "product": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "product_id": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-97.el7_9.5?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-97.el7_9.5.ppc64le", "product": { "name": "mod_session-0:2.4.6-97.el7_9.5.ppc64le", "product_id": "mod_session-0:2.4.6-97.el7_9.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-97.el7_9.5?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "product": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "product_id": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-97.el7_9.5?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "product_id": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-97.el7_9.5?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "product": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "product_id": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-97.el7_9.5?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "product_id": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-97.el7_9.5?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-97.el7_9.5.ppc64", "product": { "name": "httpd-0:2.4.6-97.el7_9.5.ppc64", "product_id": "httpd-0:2.4.6-97.el7_9.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-97.el7_9.5?arch=ppc64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "product": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "product_id": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-97.el7_9.5?arch=ppc64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "product": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "product_id": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-97.el7_9.5?arch=ppc64" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-97.el7_9.5.ppc64", "product": { "name": "mod_session-0:2.4.6-97.el7_9.5.ppc64", "product_id": "mod_session-0:2.4.6-97.el7_9.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-97.el7_9.5?arch=ppc64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "product": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "product_id": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-97.el7_9.5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "product": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "product_id": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-97.el7_9.5?arch=ppc64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "product": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "product_id": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-97.el7_9.5?arch=ppc64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "product": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "product_id": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-97.el7_9.5?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-97.el7_9.5.s390x", "product": { "name": "httpd-0:2.4.6-97.el7_9.5.s390x", "product_id": "httpd-0:2.4.6-97.el7_9.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-97.el7_9.5?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-97.el7_9.5.s390x", "product": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.s390x", "product_id": "httpd-devel-0:2.4.6-97.el7_9.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-97.el7_9.5?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-97.el7_9.5.s390x", "product": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.s390x", "product_id": "httpd-tools-0:2.4.6-97.el7_9.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-97.el7_9.5?arch=s390x" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-97.el7_9.5.s390x", "product": { "name": "mod_session-0:2.4.6-97.el7_9.5.s390x", "product_id": "mod_session-0:2.4.6-97.el7_9.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-97.el7_9.5?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-97.el7_9.5.s390x", "product": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.s390x", "product_id": "mod_ssl-1:2.4.6-97.el7_9.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-97.el7_9.5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "product": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "product_id": "httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-97.el7_9.5?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-97.el7_9.5.s390x", "product": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.s390x", "product_id": "mod_ldap-0:2.4.6-97.el7_9.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-97.el7_9.5?arch=s390x" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "product": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "product_id": "mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-97.el7_9.5?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.src", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-97.el7_9.5.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch" }, "product_reference": "httpd-manual-0:2.4.6-97.el7_9.5.noarch", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.src", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-97.el7_9.5.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch" }, "product_reference": "httpd-manual-0:2.4.6-97.el7_9.5.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.src", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-97.el7_9.5.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch" }, "product_reference": "httpd-manual-0:2.4.6-97.el7_9.5.noarch", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.src", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-97.el7_9.5.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch" }, "product_reference": "httpd-manual-0:2.4.6-97.el7_9.5.noarch", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.src", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-97.el7_9.5.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch" }, "product_reference": "httpd-manual-0:2.4.6-97.el7_9.5.noarch", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.src", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-97.el7_9.5.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch" }, "product_reference": "httpd-manual-0:2.4.6-97.el7_9.5.noarch", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_session-0:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-97.el7_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-22720", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064321" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd. The inbound connection is not closed when it fails to discard the request body, which may expose the server to HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22720" }, { "category": "external", "summary": "RHBZ#2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-24T10:50:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1045" }, { "category": "workaround", "details": "There are currently no known mitigations for this issue.", "product_ids": [ "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Client-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Client-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7ComputeNode-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7ComputeNode-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Server-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Server-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Server-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Server-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Workstation-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Workstation-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.src", "7Workstation-optional-7.9.Z:httpd-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:httpd-debuginfo-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:httpd-devel-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:httpd-manual-0:2.4.6-97.el7_9.5.noarch", "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:httpd-tools-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:mod_ldap-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:mod_proxy_html-1:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:mod_session-0:2.4.6-97.el7_9.5.x86_64", "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64", "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.ppc64le", "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.s390x", "7Workstation-optional-7.9.Z:mod_ssl-1:2.4.6-97.el7_9.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling" } ] }
RHSA-2022:1389
Vulnerability from csaf_redhat
Published
2022-04-20 19:44
Modified
2025-02-28 01:34
Summary
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP11 security update
Notes
Topic
Updated packages that provide Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 11, fix several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
This release adds the new Apache HTTP Server 2.4.37 Service Pack 11 packages that are part of the JBoss Core Services offering.
This release serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 10 and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes and enhancements included in this release.
Security Fix(es):
* jbcs-httpd24-httpd: httpd: HTTP request smuggling vulnerability in Apache HTTP Server 2.4.52 and earlier (CVE-2022-22720)
* libxml2: use-after-free in xmlXIncludeDoProcess() in xinclude.c (CVE-2021-3518)
* libxml2: heap-based buffer overflow in xmlEncodeEntitiesInternal() in entities.c (CVE-2021-3517)
* libxml2: use-after-free in xmlEncodeEntitiesInternal() in entities.c (CVE-2021-3516)
* libxml2: Exponential entity expansion attack bypasses all existing protection mechanisms (CVE-2021-3541)
* libxml2: NULL pointer dereference when post-validating mixed content parsed in recovery mode (CVE-2021-3537)
* libxml2: Use-after-free of ID and IDREF attributes (CVE-2022-23308)
* openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated packages that provide Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 11, fix several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This release adds the new Apache HTTP Server 2.4.37 Service Pack 11 packages that are part of the JBoss Core Services offering.\n\nThis release serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 10 and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* jbcs-httpd24-httpd: httpd: HTTP request smuggling vulnerability in Apache HTTP Server 2.4.52 and earlier (CVE-2022-22720)\n* libxml2: use-after-free in xmlXIncludeDoProcess() in xinclude.c (CVE-2021-3518)\n* libxml2: heap-based buffer overflow in xmlEncodeEntitiesInternal() in entities.c (CVE-2021-3517)\n* libxml2: use-after-free in xmlEncodeEntitiesInternal() in entities.c (CVE-2021-3516)\n* libxml2: Exponential entity expansion attack bypasses all existing protection mechanisms (CVE-2021-3541)\n* libxml2: NULL pointer dereference when post-validating mixed content parsed in recovery mode (CVE-2021-3537)\n* libxml2: Use-after-free of ID and IDREF attributes (CVE-2022-23308)\n* openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1389", "url": "https://access.redhat.com/errata/RHSA-2022:1389" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1950515", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1950515" }, { "category": "external", "summary": "1954225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954225" }, { "category": "external", "summary": "1954232", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954232" }, { "category": "external", "summary": "1954242", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954242" }, { "category": "external", "summary": "1956522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956522" }, { "category": "external", "summary": "2056913", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056913" }, { "category": "external", "summary": "2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "external", "summary": "2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1389.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP11 security update", "tracking": { "current_release_date": "2025-02-28T01:34:19+00:00", "generator": { "date": "2025-02-28T01:34:19+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.3.1" } }, "id": "RHSA-2022:1389", "initial_release_date": "2022-04-20T19:44:47+00:00", "revision_history": [ { "date": "2022-04-20T19:44:47+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-04-20T19:44:47+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-02-28T01:34:19+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Core Services on RHEL 7 Server", "product": { "name": "Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1::el7" } } }, { "category": "product_name", "name": "Red Hat JBoss Core Services on RHEL 8", "product": { "name": "Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1::el8" } } } ], "category": "product_family", "name": "Red Hat JBoss Core Services" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "product": { "name": "jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "product_id": "jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.1.1g-11.jbcs.el7?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "product": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "product_id": "jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-41.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "product": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "product_id": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11@0.4.10-26.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "product": { "name": "jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "product_id": "jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil@1.0.0-11.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "product": { "name": "jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "product_id": "jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-80.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-41.jbcs.el7?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-68.GA.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk@1.2.48-29.redhat_1.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.16-10.Final_redhat_2.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-22.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "product": { "name": "jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "product_id": "jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util@1.6.1-91.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "product": { "name": "jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "product_id": "jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl@7.78.0-3.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "product": { "name": "jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "product_id": "jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.1.1g-11.el8jbcs?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "product": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "product_id": "jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-41.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "product": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "product_id": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11@0.4.10-26.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "product": { "name": "jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "product_id": "jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil@1.0.0-11.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "product": { "name": "jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "product_id": "jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-80.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "product": { "name": "jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "product_id": "jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-41.el8jbcs?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "product_id": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-68.GA.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "product": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "product_id": "jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-22.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "product": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.16-10.Final_redhat_2.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "product": { "name": "jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "product_id": "jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk@1.2.48-29.redhat_1.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "product": { "name": "jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "product_id": "jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util@1.6.1-91.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "product": { "name": "jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "product_id": "jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl@7.78.0-3.el8jbcs?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.1.1g-11.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.1.1g-11.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.1.1g-11.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.1.1g-11.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.1.1g-11.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.1.1g-11.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-41.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-devel@1.39.2-41.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-debuginfo@1.39.2-41.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11@0.4.10-26.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11-debuginfo@0.4.10-26.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil@1.0.0-11.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil-debuginfo@1.0.0-11.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-80.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.37-80.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.37-80.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.37-80.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.37-80.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.37-80.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.37-80.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.37-80.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.37-80.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-41.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md-debuginfo@2.0.8-41.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-68.GA.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.2-68.GA.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24@1.2.48-29.redhat_1.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-manual@1.2.48-29.redhat_1.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-debuginfo@1.2.48-29.redhat_1.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.16-10.Final_redhat_2.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native-debuginfo@1.3.16-10.Final_redhat_2.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-22.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2-debuginfo@1.15.7-22.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util@1.6.1-91.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-devel@1.6.1-91.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-ldap@1.6.1-91.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-mysql@1.6.1-91.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-nss@1.6.1-91.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-odbc@1.6.1-91.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-openssl@1.6.1-91.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-pgsql@1.6.1-91.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-sqlite@1.6.1-91.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-debuginfo@1.6.1-91.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl@7.78.0-3.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl@7.78.0-3.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl-devel@7.78.0-3.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl-debuginfo@7.78.0-3.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.1.1g-11.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.1.1g-11.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.1.1g-11.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.1.1g-11.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.1.1g-11.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.1.1g-11.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs-debuginfo@1.1.1g-11.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "product_id": "jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-41.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "product_id": "jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-devel@1.39.2-41.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "product_id": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-debuginfo@1.39.2-41.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11@0.4.10-26.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11-debuginfo@0.4.10-26.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil@1.0.0-11.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil-debuginfo@1.0.0-11.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-80.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.37-80.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.37-80.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.37-80.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.37-80.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.37-80.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.37-80.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.37-80.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.37-80.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools-debuginfo@2.4.37-80.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap-debuginfo@2.4.37-80.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html-debuginfo@2.4.37-80.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session-debuginfo@2.4.37-80.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl-debuginfo@2.4.37-80.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-41.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md-debuginfo@2.0.8-41.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-68.GA.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.2-68.GA.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-22.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2-debuginfo@1.15.7-22.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.16-10.Final_redhat_2.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native-debuginfo@1.3.16-10.Final_redhat_2.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24@1.2.48-29.redhat_1.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-manual@1.2.48-29.redhat_1.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24-debuginfo@1.2.48-29.redhat_1.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-devel@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-ldap@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-mysql@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-nss@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-odbc@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-openssl@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-pgsql@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-sqlite@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-debuginfo@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-ldap-debuginfo@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-mysql-debuginfo@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-nss-debuginfo@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-odbc-debuginfo@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-openssl-debuginfo@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-pgsql-debuginfo@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-sqlite-debuginfo@1.6.1-91.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "product_id": "jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl@7.78.0-3.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "product_id": "jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl@7.78.0-3.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "product_id": "jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl-devel@7.78.0-3.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "product_id": "jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl-debuginfo@7.78.0-3.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "product_id": "jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl-debuginfo@7.78.0-3.el8jbcs?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "product": { "name": "jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "product_id": "jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.37-80.jbcs.el7?arch=noarch" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "product": { "name": "jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "product_id": "jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.37-80.el8jbcs?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch" }, "product_reference": "jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src" }, "product_reference": "jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src" }, "product_reference": "jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch" }, "product_reference": "jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src" }, "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src" }, "product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src" }, "product_reference": "jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src" }, "product_reference": "jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src" }, "product_reference": "jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src" }, "product_reference": "jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src" }, "product_reference": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "zodf0055980" ], "organization": "SQLab NCTU Taiwan" } ], "cve": "CVE-2021-3516", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-04-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1954225" } ], "notes": [ { "category": "description", "text": "There\u0027s a flaw in libxml2\u0027s xmllint. An attacker who is able to submit a crafted file to be processed by xmllint could trigger a use-after-free. The greatest impact of this flaw is to confidentiality, integrity, and availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Use-after-free in xmlEncodeEntitiesInternal() in entities.c", "title": "Vulnerability summary" }, { "category": "other", "text": "The only known exploitation path of this flaw is via the xmllint tool.\n\nThis flaw is out of support scope for Red Hat Enterprise Linux 6 and 7. To learn more about Red Hat Enterprise Linux support life cycles, please see https://access.redhat.com/support/policy/updates/errata .", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3516" }, { "category": "external", "summary": "RHBZ#1954225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954225" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3516", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3516" } ], "release_date": "2021-04-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:44:47+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1389" }, { "category": "workaround", "details": "This flaw can be mitigated by not using xmllint with the --html and --push options together.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Use-after-free in xmlEncodeEntitiesInternal() in entities.c" }, { "acknowledgments": [ { "names": [ "zodf0055980" ], "organization": "SQLab NCTU Taiwan" } ], "cve": "CVE-2021-3517", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-04-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1954232" } ], "notes": [ { "category": "description", "text": "There is a flaw in the xml entity encoding functionality of libxml2. An attacker who is able to supply a crafted file to be processed by an application linked with the affected functionality of libxml2 could trigger an out-of-bounds read. The most likely impact of this flaw is to application availability, with some potential impact to confidentiality and integrity if an attacker is able to use memory information to further exploit the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Heap-based buffer overflow in xmlEncodeEntitiesInternal() in entities.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is out of support scope for Red Hat Enterprise Linux 6 and 7. To learn more about Red Hat Enterprise Linux support life cycles, please see https://access.redhat.com/support/policy/updates/errata .", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3517" }, { "category": "external", "summary": "RHBZ#1954232", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954232" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3517", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3517" } ], "release_date": "2021-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:44:47+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1389" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Heap-based buffer overflow in xmlEncodeEntitiesInternal() in entities.c" }, { "acknowledgments": [ { "names": [ "zodf0055980" ], "organization": "SQLab NCTU Taiwan" } ], "cve": "CVE-2021-3518", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-04-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1954242" } ], "notes": [ { "category": "description", "text": "There\u0027s a flaw in libxml2. An attacker who is able to submit a crafted file to be processed by an application linked with libxml2 could trigger a use-after-free. The greatest impact from this flaw is to confidentiality, integrity, and availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Use-after-free in xmlXIncludeDoProcess() in xinclude.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is out of support scope for Red Hat Enterprise Linux 6 and 7. To learn more about Red Hat Enterprise Linux support life cycles, please see https://access.redhat.com/support/policy/updates/errata .", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3518" }, { "category": "external", "summary": "RHBZ#1954242", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954242" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3518", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3518" } ], "release_date": "2021-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:44:47+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1389" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Use-after-free in xmlXIncludeDoProcess() in xinclude.c" }, { "acknowledgments": [ { "names": [ "yuawn" ], "organization": "NSLab NTU Taiwan" } ], "cve": "CVE-2021-3537", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2021-05-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1956522" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in libxml2, where it did not propagate errors while parsing XML mixed content. This flaw causes the application to crash if an untrusted XML document is parsed in recovery mode and post validated. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: NULL pointer dereference when post-validating mixed content parsed in recovery mode", "title": "Vulnerability summary" }, { "category": "other", "text": "For the flaw to be exploitable, the document must be parsed in recovery mode and post validated (e.g.: when used in the `xmlling` tool, both `-recover` and `-postvalid` options must be used for the flaw to be exploitable)", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3537" }, { "category": "external", "summary": "RHBZ#1956522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956522" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3537", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3537" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3537", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3537" } ], "release_date": "2021-05-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:44:47+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1389" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: NULL pointer dereference when post-validating mixed content parsed in recovery mode" }, { "acknowledgments": [ { "names": [ "Sebastian Pipping" ] } ], "cve": "CVE-2021-3541", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1950515" } ], "notes": [ { "category": "description", "text": "A flaw was found in libxml2. Exponential entity expansion attack its possible bypassing all existing protection mechanisms and leading to denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Exponential entity expansion attack bypasses all existing protection mechanisms", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3541" }, { "category": "external", "summary": "RHBZ#1950515", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1950515" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3541", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3541" } ], "release_date": "2021-05-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:44:47+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1389" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Exponential entity expansion attack bypasses all existing protection mechanisms" }, { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2022-03-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2062202" } ], "notes": [ { "category": "description", "text": "A flaw was found in OpenSSL. It is possible to trigger an infinite loop by crafting a certificate that has invalid elliptic curve parameters. Since certificate parsing happens before verification of the certificate signature, any process that parses an externally supplied certificate may be subject to a denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates", "title": "Vulnerability summary" }, { "category": "other", "text": "While Red Hat initially stated not to be directly affected by this flaw, after further investigation we found that the versions of OpenSSL as shipped in Red Hat Enterprise Linux 6, 7, and 8 are vulnerable to a denial of service attack through malicious Elliptic Curve parameters. During processing of the parameters OpenSSL will call BN_mod_sqrt() with invalid arguments, causing the process to enter an infinite loop. The invalid EC parameters can be provided to OpenSSL through X.509 certificates (used in TLS connections), through public and private keys, through certificate signing requests and other places where applications process Elliptic Curve parameters. The flaw has been rated as having a security impact of Important. A future update will address this issue in Red Hat Enterprise Linux 6, 7 and 8.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0778" }, { "category": "external", "summary": "RHBZ#2062202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0778", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0778" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20220315.txt", "url": "https://www.openssl.org/news/secadv/20220315.txt" } ], "release_date": "2022-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:44:47+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1389" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates" }, { "cve": "CVE-2022-22720", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064321" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd. The inbound connection is not closed when it fails to discard the request body, which may expose the server to HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22720" }, { "category": "external", "summary": "RHBZ#2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:44:47+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1389" }, { "category": "workaround", "details": "There are currently no known mitigations for this issue.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling" }, { "cve": "CVE-2022-23308", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-02-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2056913" } ], "notes": [ { "category": "description", "text": "A flaw was found in libxml2. A call to the xmlGetID function can return a pointer already freed when parsing an XML document with the XML_PARSE_DTDVALID option and without the XML_PARSE_NOENT option, resulting in a use-after-free issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Use-after-free of ID and IDREF attributes", "title": "Vulnerability summary" }, { "category": "other", "text": "The security impact of xmlGetID() returning a pointer to freed memory depends on the application and will mostly result in a denial of service (DoS). The typical use case of calling xmlGetID() on an unmodified document is not affected, therefore this issue was rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23308" }, { "category": "external", "summary": "RHBZ#2056913", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056913" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23308", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23308" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23308", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23308" } ], "release_date": "2022-02-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-20T19:44:47+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1389" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-91.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-80.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-3.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-10.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-29.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-29.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-68.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-80.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-26.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-11.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Use-after-free of ID and IDREF attributes" } ] }
RHSA-2022:1138
Vulnerability from csaf_redhat
Published
2022-04-01 22:24
Modified
2025-02-28 01:33
Summary
Red Hat Security Advisory: httpd security update
Notes
Topic
An update for httpd is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_lua: Possible buffer overflow when parsing multipart content (CVE-2021-44790)
* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for httpd is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: mod_lua: Possible buffer overflow when parsing multipart content (CVE-2021-44790)\n\n* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1138", "url": "https://access.redhat.com/errata/RHSA-2022:1138" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2034674", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034674" }, { "category": "external", "summary": "2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1138.json" } ], "title": "Red Hat Security Advisory: httpd security update", "tracking": { "current_release_date": "2025-02-28T01:33:25+00:00", "generator": { "date": "2025-02-28T01:33:25+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.3.1" } }, "id": "RHSA-2022:1138", "initial_release_date": "2022-04-01T22:24:31+00:00", "revision_history": [ { "date": "2022-04-01T22:24:31+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-04-01T22:24:31+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-02-28T01:33:25+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.4::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.4::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-67.el7_4.9.src", "product": { "name": "httpd-0:2.4.6-67.el7_4.9.src", "product_id": "httpd-0:2.4.6-67.el7_4.9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-67.el7_4.9?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-67.el7_4.9.x86_64", "product": { "name": "httpd-0:2.4.6-67.el7_4.9.x86_64", "product_id": "httpd-0:2.4.6-67.el7_4.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-67.el7_4.9?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "product": { "name": "httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "product_id": "httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-67.el7_4.9?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "product": { "name": "httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "product_id": "httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-67.el7_4.9?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-67.el7_4.9.x86_64", "product": { "name": "mod_session-0:2.4.6-67.el7_4.9.x86_64", "product_id": "mod_session-0:2.4.6-67.el7_4.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-67.el7_4.9?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-67.el7_4.9.x86_64", "product": { "name": "mod_ssl-1:2.4.6-67.el7_4.9.x86_64", "product_id": "mod_ssl-1:2.4.6-67.el7_4.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-67.el7_4.9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "product_id": "httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-67.el7_4.9?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "product": { "name": "mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "product_id": "mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-67.el7_4.9?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "product": { "name": "mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "product_id": "mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-67.el7_4.9?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-manual-0:2.4.6-67.el7_4.9.noarch", "product": { "name": "httpd-manual-0:2.4.6-67.el7_4.9.noarch", "product_id": "httpd-manual-0:2.4.6-67.el7_4.9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-67.el7_4.9?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-67.el7_4.9.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src" }, "product_reference": "httpd-0:2.4.6-67.el7_4.9.src", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-67.el7_4.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64" }, "product_reference": "httpd-0:2.4.6-67.el7_4.9.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-67.el7_4.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-67.el7_4.9.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch" }, "product_reference": "httpd-manual-0:2.4.6-67.el7_4.9.noarch", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-67.el7_4.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-67.el7_4.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-67.el7_4.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64" }, "product_reference": "mod_session-0:2.4.6-67.el7_4.9.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-67.el7_4.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)", "product_id": "7Server-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-67.el7_4.9.x86_64", "relates_to_product_reference": "7Server-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-67.el7_4.9.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src" }, "product_reference": "httpd-0:2.4.6-67.el7_4.9.src", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-67.el7_4.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64" }, "product_reference": "httpd-0:2.4.6-67.el7_4.9.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-67.el7_4.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-67.el7_4.9.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch" }, "product_reference": "httpd-manual-0:2.4.6-67.el7_4.9.noarch", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-67.el7_4.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-67.el7_4.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-67.el7_4.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64" }, "product_reference": "mod_session-0:2.4.6-67.el7_4.9.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-67.el7_4.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)", "product_id": "7Server-optional-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-67.el7_4.9.x86_64", "relates_to_product_reference": "7Server-optional-7.4.AUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-44790", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034674" } ], "notes": [ { "category": "description", "text": "A buffer overflow flaw in httpd\u0027s lua module could allow an out-of-bounds write. An attacker who is able to submit a crafted request to an httpd instance that is using the lua module may be able to cause an impact to confidentiality, integrity, and/or availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_lua: Possible buffer overflow when parsing multipart content", "title": "Vulnerability summary" }, { "category": "other", "text": "httpd as shipped in Red Hat Enterprise Linux 6 is NOT affected by this flaw because it does not ship mod_lua.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src", "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch", "7Server-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src", "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch", "7Server-optional-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-44790" }, { "category": "external", "summary": "RHBZ#2034674", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034674" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44790", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44790" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44790", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44790" }, { "category": "external", "summary": "http://httpd.apache.org/security/vulnerabilities_24.html", "url": "http://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-01T22:24:31+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src", "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch", "7Server-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src", "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch", "7Server-optional-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1138" }, { "category": "workaround", "details": "Disabling mod_lua and restarting httpd will mitigate this flaw. See https://access.redhat.com/articles/10649 for more information.", "product_ids": [ "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src", "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch", "7Server-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src", "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch", "7Server-optional-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src", "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch", "7Server-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src", "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch", "7Server-optional-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: mod_lua: Possible buffer overflow when parsing multipart content" }, { "cve": "CVE-2022-22720", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064321" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd. The inbound connection is not closed when it fails to discard the request body, which may expose the server to HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src", "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch", "7Server-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src", "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch", "7Server-optional-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22720" }, { "category": "external", "summary": "RHBZ#2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-04-01T22:24:31+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src", "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch", "7Server-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src", "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch", "7Server-optional-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1138" }, { "category": "workaround", "details": "There are currently no known mitigations for this issue.", "product_ids": [ "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src", "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch", "7Server-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src", "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch", "7Server-optional-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src", "7Server-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch", "7Server-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64", "7Server-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.src", "7Server-optional-7.4.AUS:httpd-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-debuginfo-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-devel-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:httpd-manual-0:2.4.6-67.el7_4.9.noarch", "7Server-optional-7.4.AUS:httpd-tools-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_ldap-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_proxy_html-1:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_session-0:2.4.6-67.el7_4.9.x86_64", "7Server-optional-7.4.AUS:mod_ssl-1:2.4.6-67.el7_4.9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling" } ] }
rhsa-2022_1049
Vulnerability from csaf_redhat
Published
2022-03-24 11:24
Modified
2024-11-15 14:45
Summary
Red Hat Security Advisory: httpd:2.4 security update
Notes
Topic
An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1049", "url": "https://access.redhat.com/errata/RHSA-2022:1049" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1049.json" } ], "title": "Red Hat Security Advisory: httpd:2.4 security update", "tracking": { "current_release_date": "2024-11-15T14:45:54+00:00", "generator": { "date": "2024-11-15T14:45:54+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:1049", "initial_release_date": "2022-03-24T11:24:58+00:00", "revision_history": [ { "date": "2022-03-24T11:24:58+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-03-24T11:24:58+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T14:45:54+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd:2.4:8050020220321170448:c5368500", "product": { "name": "httpd:2.4:8050020220321170448:c5368500", "product_id": "httpd:2.4:8050020220321170448:c5368500", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/httpd@2.4:8050020220321170448:c5368500" } } }, { "category": "product_version", "name": "httpd-filesystem-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch", "product": { "name": "httpd-filesystem-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch", "product_id": "httpd-filesystem-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=noarch" } } }, { "category": "product_version", "name": "httpd-manual-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch", "product": { "name": "httpd-manual-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch", "product_id": "httpd-manual-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product": { "name": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_id": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product": { "name": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_id": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product": { "name": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_id": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product": { "name": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_id": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product": { "name": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_id": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_id": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product_id": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product_id": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product_id": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product": { "name": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_id": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_id": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=aarch64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product": { "name": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_id": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product": { "name": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_id": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=aarch64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product": { "name": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_id": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product": { "name": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_id": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_id": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.src", "product": { "name": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.src", "product_id": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=src" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src", "product": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src", "product_id": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=src" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product": { "name": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_id": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_id": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product": { "name": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_id": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product": { "name": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_id": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product": { "name": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_id": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_id": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product_id": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product_id": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product_id": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product": { "name": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_id": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_id": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_id": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product": { "name": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_id": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product": { "name": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_id": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product": { "name": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_id": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_id": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product": { "name": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_id": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product": { "name": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_id": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product": { "name": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_id": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product": { "name": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_id": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product": { "name": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_id": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_id": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product_id": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product_id": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product_id": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product": { "name": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_id": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_id": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=s390x" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product": { "name": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_id": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product": { "name": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_id": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=s390x" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product": { "name": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_id": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product": { "name": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_id": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_id": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product": { "name": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_id": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_id": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product": { "name": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_id": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product": { "name": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_id": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product": { "name": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_id": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_id": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product_id": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product_id": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product_id": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product": { "name": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_id": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_id": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product": { "name": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_id": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product": { "name": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_id": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product": { "name": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_id": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product": { "name": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_id": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_id": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-43.module%2Bel8.5.0%2B14530%2B6f259f31.3?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, "product_reference": "httpd:2.4:8050020220321170448:c5368500", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64" }, "product_reference": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le" }, "product_reference": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x" }, "product_reference": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.src as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.src" }, "product_reference": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.src", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" }, "product_reference": "httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64" }, "product_reference": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64" }, "product_reference": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le" }, "product_reference": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x" }, "product_reference": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64" }, "product_reference": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le" }, "product_reference": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x" }, "product_reference": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-filesystem-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-manual-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch" }, "product_reference": "httpd-manual-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64" }, "product_reference": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le" }, "product_reference": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x" }, "product_reference": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le" }, "product_reference": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x" }, "product_reference": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64" }, "product_reference": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le" }, "product_reference": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x" }, "product_reference": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64" }, "product_reference": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x" }, "product_reference": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64" }, "product_reference": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le" }, "product_reference": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x" }, "product_reference": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" }, "product_reference": "mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le" }, "product_reference": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x" }, "product_reference": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64" }, "product_reference": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le" }, "product_reference": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x" }, "product_reference": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64 as a component of httpd:2.4:8050020220321170448:c5368500 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "relates_to_product_reference": "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-22720", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064321" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd. The inbound connection is not closed when it fails to discard the request body, which may expose the server to HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.src", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-filesystem-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-manual-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22720" }, { "category": "external", "summary": "RHBZ#2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-24T11:24:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.src", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-filesystem-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-manual-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1049" }, { "category": "workaround", "details": "There are currently no known mitigations for this issue.", "product_ids": [ "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.src", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-filesystem-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-manual-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.src", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-debugsource-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-devel-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-filesystem-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-manual-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.noarch", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:httpd-tools-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ldap-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_proxy_html-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_session-debuginfo-0:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.aarch64", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.ppc64le", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.s390x", "AppStream-8.5.0.Z.MAIN:httpd:2.4:8050020220321170448:c5368500:mod_ssl-debuginfo-1:2.4.37-43.module+el8.5.0+14530+6f259f31.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling" } ] }
rhsa-2022_1072
Vulnerability from csaf_redhat
Published
2022-03-28 10:39
Modified
2024-11-15 14:44
Summary
Red Hat Security Advisory: httpd:2.4 security update
Notes
Topic
An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1072", "url": "https://access.redhat.com/errata/RHSA-2022:1072" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1072.json" } ], "title": "Red Hat Security Advisory: httpd:2.4 security update", "tracking": { "current_release_date": "2024-11-15T14:44:46+00:00", "generator": { "date": "2024-11-15T14:44:46+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:1072", "initial_release_date": "2022-03-28T10:39:35+00:00", "revision_history": [ { "date": "2022-03-28T10:39:35+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-03-28T10:39:35+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T14:44:46+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.4::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd:2.4:8040020220321171351:522a0ee4", "product": { "name": "httpd:2.4:8040020220321171351:522a0ee4", "product_id": "httpd:2.4:8040020220321171351:522a0ee4", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/httpd@2.4:8040020220321171351:522a0ee4" } } }, { "category": "product_version", "name": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch", "product": { "name": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch", "product_id": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=noarch" } } }, { "category": "product_version", "name": "httpd-manual-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch", "product": { "name": "httpd-manual-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch", "product_id": "httpd-manual-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product": { "name": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_id": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product": { "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_id": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product": { "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_id": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product": { "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_id": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product": { "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_id": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_id": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product_id": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product_id": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product_id": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product": { "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_id": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_id": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product": { "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_id": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product": { "name": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_id": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product": { "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_id": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product": { "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_id": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_id": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.src", "product": { "name": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.src", "product_id": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=src" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src", "product": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src", "product_id": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=src" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product": { "name": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_id": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_id": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product": { "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_id": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product": { "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_id": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product": { "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_id": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_id": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product_id": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product_id": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product_id": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product": { "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_id": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_id": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_id": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product": { "name": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_id": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product": { "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_id": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product": { "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_id": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_id": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product": { "name": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_id": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product": { "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_id": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product": { "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_id": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product": { "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_id": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product": { "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_id": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_id": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product_id": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product_id": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product_id": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product": { "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_id": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_id": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=s390x" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product": { "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_id": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product": { "name": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_id": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=s390x" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product": { "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_id": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product": { "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_id": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_id": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product": { "name": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_id": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_id": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product": { "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_id": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product": { "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_id": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product": { "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_id": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_id": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product_id": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product_id": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product_id": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-3.module%2Bel8.4.0%2B8625%2Bd397f3da?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product": { "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_id": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_id": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product": { "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_id": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product": { "name": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_id": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product": { "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_id": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product": { "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_id": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_id": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-39.module%2Bel8.4.0%2B14531%2Be1b94dfe.4?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, "product_reference": "httpd:2.4:8040020220321171351:522a0ee4", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64" }, "product_reference": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le" }, "product_reference": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x" }, "product_reference": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.src as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.src" }, "product_reference": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.src", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" }, "product_reference": "httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64" }, "product_reference": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64" }, "product_reference": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le" }, "product_reference": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x" }, "product_reference": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64" }, "product_reference": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le" }, "product_reference": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x" }, "product_reference": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch" }, "product_reference": "httpd-manual-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64" }, "product_reference": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le" }, "product_reference": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x" }, "product_reference": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le" }, "product_reference": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x" }, "product_reference": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64" }, "product_reference": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le" }, "product_reference": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x" }, "product_reference": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64" }, "product_reference": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x" }, "product_reference": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64" }, "product_reference": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le" }, "product_reference": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x" }, "product_reference": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" }, "product_reference": "mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le" }, "product_reference": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x" }, "product_reference": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64" }, "product_reference": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le" }, "product_reference": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x" }, "product_reference": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64 as a component of httpd:2.4:8040020220321171351:522a0ee4 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-22720", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064321" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd. The inbound connection is not closed when it fails to discard the request body, which may expose the server to HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.src", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22720" }, { "category": "external", "summary": "RHBZ#2064321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064321" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22720" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-28T10:39:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.src", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1072" }, { "category": "workaround", "details": "There are currently no known mitigations for this issue.", "product_ids": [ "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.src", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.src", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.noarch", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.src", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+8625+d397f3da.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.x86_64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.aarch64", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.ppc64le", "AppStream-8.4.0.Z.EUS:httpd:2.4:8040020220321171351:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+14531+e1b94dfe.4.s390x", "AppStream-8.4.0.Z.EUS:httpd:2.4:804002022032117135