Action not permitted
Modal body text goes here.
cve-2024-38477
Vulnerability from cvelistv5
Published
2024-07-01 18:16
Modified
2024-09-13 17:04
Severity ?
EPSS score ?
Summary
Apache HTTP Server: Crash resulting in Denial of Service in mod_proxy via a malicious request
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Apache Software Foundation | Apache HTTP Server |
Version: 2.4.0 ≤ 2.4.59 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-38477", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-22T16:23:13.858578Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-22T16:23:33.260Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-09-13T17:04:58.395Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://httpd.apache.org/security/vulnerabilities_24.html" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20240712-0001/" }, { "url": "http://www.openwall.com/lists/oss-security/2024/07/01/10" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Apache HTTP Server", "vendor": "Apache Software Foundation", "versions": [ { "lessThanOrEqual": "2.4.59", "status": "affected", "version": "2.4.0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Orange Tsai (@orange_8361) from DEVCORE" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "null pointer dereference in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows an attacker to crash the server via a malicious request.\u003cbr\u003eUsers are recommended to upgrade to version 2.4.60, which fixes this issue." } ], "value": "null pointer dereference in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows an attacker to crash the server via a malicious request.\nUsers are recommended to upgrade to version 2.4.60, which fixes this issue." } ], "metrics": [ { "other": { "content": { "text": "important" }, "type": "Textual description of severity" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-01T18:16:11.935Z", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://httpd.apache.org/security/vulnerabilities_24.html" }, { "url": "https://security.netapp.com/advisory/ntap-20240712-0001/" } ], "source": { "discovery": "UNKNOWN" }, "timeline": [ { "lang": "en", "time": "2024-04-01T12:00:00.000Z", "value": "Reported" } ], "title": "Apache HTTP Server: Crash resulting in Denial of Service in mod_proxy via a malicious request", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2024-38477", "datePublished": "2024-07-01T18:16:11.935Z", "dateReserved": "2024-06-17T11:11:30.174Z", "dateUpdated": "2024-09-13T17:04:58.395Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-38477\",\"sourceIdentifier\":\"security@apache.org\",\"published\":\"2024-07-01T19:15:05.083\",\"lastModified\":\"2024-11-21T09:26:03.687\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"null pointer dereference in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows an attacker to crash the server via a malicious request.\\nUsers are recommended to upgrade to version 2.4.60, which fixes this issue.\"},{\"lang\":\"es\",\"value\":\"La desreferencia del puntero nulo en mod_proxy en Apache HTTP Server 2.4.59 y versiones anteriores permite a un atacante bloquear el servidor mediante una solicitud maliciosa. Se recomienda a los usuarios actualizar a la versi\u00f3n 2.4.60, que soluciona este problema.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security@apache.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.4.0\",\"versionEndExcluding\":\"2.4.60\",\"matchCriteriaId\":\"13126636-FD76-4E3E-B949-14A5082DE02A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:clustered_data_ontap:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3ED302E-F464-40DE-A976-FD518E42D95D\"}]}]}],\"references\":[{\"url\":\"https://httpd.apache.org/security/vulnerabilities_24.html\",\"source\":\"security@apache.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20240712-0001/\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2024/07/01/10\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://httpd.apache.org/security/vulnerabilities_24.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20240712-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
rhsa-2024_4726
Vulnerability from csaf_redhat
Published
2024-07-23 13:24
Modified
2024-11-24 17:32
Summary
Red Hat Security Advisory: httpd security update
Notes
Topic
An update for httpd is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)
* httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)
* httpd: null pointer dereference in mod_proxy (CVE-2024-38477)
* httpd: Potential SSRF in mod_rewrite (CVE-2024-39573)
* httpd: Encoding problem in mod_proxy (CVE-2024-38473)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for httpd is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)\n\n* httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)\n\n* httpd: null pointer dereference in mod_proxy (CVE-2024-38477)\n\n* httpd: Potential SSRF in mod_rewrite (CVE-2024-39573)\n\n* httpd: Encoding problem in mod_proxy (CVE-2024-38473)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4726", "url": "https://access.redhat.com/errata/RHSA-2024:4726" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2295012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295012" }, { "category": "external", "summary": "2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "2295022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295022" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4726.json" } ], "title": "Red Hat Security Advisory: httpd security update", "tracking": { "current_release_date": "2024-11-24T17:32:53+00:00", "generator": { "date": "2024-11-24T17:32:53+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:4726", "initial_release_date": "2024-07-23T13:24:43+00:00", "revision_history": [ { "date": "2024-07-23T13:24:43+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-07-23T13:24:43+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T17:32:53+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.57-11.el9_4.src", "product": { "name": "httpd-0:2.4.57-11.el9_4.src", "product_id": "httpd-0:2.4.57-11.el9_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.57-11.el9_4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.57-11.el9_4.aarch64", "product": { "name": "httpd-0:2.4.57-11.el9_4.aarch64", "product_id": "httpd-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-core-0:2.4.57-11.el9_4.aarch64", "product": { "name": "httpd-core-0:2.4.57-11.el9_4.aarch64", "product_id": "httpd-core-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.57-11.el9_4.aarch64", "product": { "name": "httpd-devel-0:2.4.57-11.el9_4.aarch64", "product_id": "httpd-devel-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.57-11.el9_4.aarch64", "product": { "name": "httpd-tools-0:2.4.57-11.el9_4.aarch64", "product_id": "httpd-tools-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.57-11.el9_4.aarch64", "product": { "name": "mod_ldap-0:2.4.57-11.el9_4.aarch64", "product_id": "mod_ldap-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.57-11.el9_4.aarch64", "product": { "name": "mod_lua-0:2.4.57-11.el9_4.aarch64", "product_id": "mod_lua-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "product": { "name": "mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "product_id": "mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.57-11.el9_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.57-11.el9_4.aarch64", "product": { "name": "mod_session-0:2.4.57-11.el9_4.aarch64", "product_id": "mod_session-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.57-11.el9_4.aarch64", "product": { "name": "mod_ssl-1:2.4.57-11.el9_4.aarch64", "product_id": "mod_ssl-1:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.57-11.el9_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "product": { "name": "httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "product_id": "httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "product": { "name": "httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "product_id": "httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core-debuginfo@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "product": { "name": "httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "product_id": "httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "product": { "name": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "product_id": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "product": { "name": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "product_id": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "product": { "name": "mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "product_id": "mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "product_id": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.57-11.el9_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "product": { "name": "mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "product_id": "mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.57-11.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "product": { "name": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "product_id": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.57-11.el9_4?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "httpd-0:2.4.57-11.el9_4.ppc64le", "product_id": "httpd-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-core-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "httpd-core-0:2.4.57-11.el9_4.ppc64le", "product_id": "httpd-core-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "httpd-devel-0:2.4.57-11.el9_4.ppc64le", "product_id": "httpd-devel-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "httpd-tools-0:2.4.57-11.el9_4.ppc64le", "product_id": "httpd-tools-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "mod_ldap-0:2.4.57-11.el9_4.ppc64le", "product_id": "mod_ldap-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "mod_lua-0:2.4.57-11.el9_4.ppc64le", "product_id": "mod_lua-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "product_id": "mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.57-11.el9_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "mod_session-0:2.4.57-11.el9_4.ppc64le", "product_id": "mod_session-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.57-11.el9_4.ppc64le", "product": { "name": "mod_ssl-1:2.4.57-11.el9_4.ppc64le", "product_id": "mod_ssl-1:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.57-11.el9_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "product_id": "httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product_id": "httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core-debuginfo@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product_id": "httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product_id": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product_id": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product_id": "mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "product_id": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.57-11.el9_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product": { "name": "mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product_id": "mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.57-11.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "product": { "name": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "product_id": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.57-11.el9_4?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.57-11.el9_4.x86_64", "product": { "name": "httpd-0:2.4.57-11.el9_4.x86_64", "product_id": "httpd-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-core-0:2.4.57-11.el9_4.x86_64", "product": { "name": "httpd-core-0:2.4.57-11.el9_4.x86_64", "product_id": "httpd-core-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.57-11.el9_4.x86_64", "product": { "name": "httpd-devel-0:2.4.57-11.el9_4.x86_64", "product_id": "httpd-devel-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.57-11.el9_4.x86_64", "product": { "name": "httpd-tools-0:2.4.57-11.el9_4.x86_64", "product_id": "httpd-tools-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.57-11.el9_4.x86_64", "product": { "name": "mod_ldap-0:2.4.57-11.el9_4.x86_64", "product_id": "mod_ldap-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.57-11.el9_4.x86_64", "product": { "name": "mod_lua-0:2.4.57-11.el9_4.x86_64", "product_id": "mod_lua-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "product": { "name": "mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "product_id": "mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.57-11.el9_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.57-11.el9_4.x86_64", "product": { "name": "mod_session-0:2.4.57-11.el9_4.x86_64", "product_id": "mod_session-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.57-11.el9_4.x86_64", "product": { "name": "mod_ssl-1:2.4.57-11.el9_4.x86_64", "product_id": "mod_ssl-1:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.57-11.el9_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "product": { "name": "httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "product_id": "httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "product": { "name": "httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "product_id": "httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core-debuginfo@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "product_id": "httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "product": { "name": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "product_id": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "product": { "name": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "product_id": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "product": { "name": "mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "product_id": "mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "product_id": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.57-11.el9_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "product": { "name": "mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "product_id": "mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.57-11.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64", "product": { "name": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64", "product_id": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.57-11.el9_4?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.57-11.el9_4.s390x", "product": { "name": "httpd-0:2.4.57-11.el9_4.s390x", "product_id": "httpd-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-core-0:2.4.57-11.el9_4.s390x", "product": { "name": "httpd-core-0:2.4.57-11.el9_4.s390x", "product_id": "httpd-core-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.57-11.el9_4.s390x", "product": { "name": "httpd-devel-0:2.4.57-11.el9_4.s390x", "product_id": "httpd-devel-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.57-11.el9_4.s390x", "product": { "name": "httpd-tools-0:2.4.57-11.el9_4.s390x", "product_id": "httpd-tools-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.57-11.el9_4.s390x", "product": { "name": "mod_ldap-0:2.4.57-11.el9_4.s390x", "product_id": "mod_ldap-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.57-11.el9_4.s390x", "product": { "name": "mod_lua-0:2.4.57-11.el9_4.s390x", "product_id": "mod_lua-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.57-11.el9_4.s390x", "product": { "name": "mod_proxy_html-1:2.4.57-11.el9_4.s390x", "product_id": "mod_proxy_html-1:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.57-11.el9_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.57-11.el9_4.s390x", "product": { "name": "mod_session-0:2.4.57-11.el9_4.s390x", "product_id": "mod_session-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.57-11.el9_4.s390x", "product": { "name": "mod_ssl-1:2.4.57-11.el9_4.s390x", "product_id": "mod_ssl-1:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.57-11.el9_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.57-11.el9_4.s390x", "product": { "name": "httpd-debugsource-0:2.4.57-11.el9_4.s390x", "product_id": "httpd-debugsource-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "product": { "name": "httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "product_id": "httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core-debuginfo@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "product": { "name": "httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "product_id": "httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "product": { "name": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "product_id": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "product": { "name": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "product_id": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "product": { "name": "mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "product_id": "mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "product_id": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.57-11.el9_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "product": { "name": "mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "product_id": "mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.57-11.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "product": { "name": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "product_id": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.57-11.el9_4?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-filesystem-0:2.4.57-11.el9_4.noarch", "product": { "name": "httpd-filesystem-0:2.4.57-11.el9_4.noarch", "product_id": "httpd-filesystem-0:2.4.57-11.el9_4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.57-11.el9_4?arch=noarch" } } }, { "category": "product_version", "name": "httpd-manual-0:2.4.57-11.el9_4.noarch", "product": { "name": "httpd-manual-0:2.4.57-11.el9_4.noarch", "product_id": "httpd-manual-0:2.4.57-11.el9_4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.57-11.el9_4?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "httpd-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "httpd-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x" }, "product_reference": "httpd-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.57-11.el9_4.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src" }, "product_reference": "httpd-0:2.4.57-11.el9_4.src", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "httpd-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "httpd-core-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "httpd-core-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x" }, "product_reference": "httpd-core-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "httpd-core-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x" }, "product_reference": "httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x" }, "product_reference": "httpd-debugsource-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "httpd-devel-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "httpd-devel-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x" }, "product_reference": "httpd-devel-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "httpd-devel-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.57-11.el9_4.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch" }, "product_reference": "httpd-filesystem-0:2.4.57-11.el9_4.noarch", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.57-11.el9_4.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch" }, "product_reference": "httpd-manual-0:2.4.57-11.el9_4.noarch", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "httpd-tools-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "httpd-tools-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x" }, "product_reference": "httpd-tools-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "httpd-tools-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x" }, "product_reference": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "mod_ldap-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "mod_ldap-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x" }, "product_reference": "mod_ldap-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "mod_ldap-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x" }, "product_reference": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "mod_lua-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "mod_lua-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x" }, "product_reference": "mod_lua-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "mod_lua-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x" }, "product_reference": "mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64" }, "product_reference": "mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x" }, "product_reference": "mod_proxy_html-1:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "mod_session-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "mod_session-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x" }, "product_reference": "mod_session-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "mod_session-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64" }, "product_reference": "mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le" }, "product_reference": "mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x" }, "product_reference": "mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64" }, "product_reference": "mod_ssl-1:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le" }, "product_reference": "mod_ssl-1:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x" }, "product_reference": "mod_ssl-1:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64" }, "product_reference": "mod_ssl-1:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le" }, "product_reference": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x" }, "product_reference": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38473", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:36+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295012" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. Due to an encoding problem, specially crafted request URLs with incorrect encoding can be sent to backend services, potentially bypassing authentication.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Encoding problem in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations where mechanisms other than ProxyPass/ProxyPassMatch or RewriteRule with the \u0027P\u0027 flag are used to configure a request to be proxied, such as SetHandler or inadvertent proxying via CVE-2024-39573. Note that these alternate mechanisms may be used within .htaccess files.\n\nFor more information about CVE-2024-39573, see https://access.redhat.com/security/cve/CVE-2024-39573.\n\nAdditionally, this flaw requires mod_proxy to be loaded and being used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38473" }, { "category": "external", "summary": "RHBZ#2295012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295012" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38473", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38473" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38473", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38473" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38473", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38473" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T13:24:43+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4726" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: Encoding problem in mod_proxy" }, { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:49+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295013" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Due to a substitution encoding issue, specially crafted requests may allow an attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant only to be executed as CGI.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Substitution encoding issue in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive. Also, to exploit this flaw, an attacker must be able to upload files to the server. For these reasons, this flaw was rated with an important and not critical severity.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38474" }, { "category": "external", "summary": "RHBZ#2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38474", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T13:24:43+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4726" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Substitution encoding issue in mod_rewrite" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:22:02+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295014" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Improper escaping of output allows an attacker to map URLs to filesystem locations permitted to be served by the server but are not intentionally or directly reachable by any URL. This issue results in code execution or source code disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Improper escaping of output in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations with substitution rules used in the RewriteRule directive using backreferences or variables as the first segment of the substitution.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38475" }, { "category": "external", "summary": "RHBZ#2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38475", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T13:24:43+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4726" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Improper escaping of output in mod_rewrite" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-07-01T19:22:29+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295016" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. A NULL pointer dereference can be triggered when processing a specially crafted HTTP request, causing the httpd server to crash, and resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "As this flaw allows a remote attacker to cause a denial of service, it has been rated with an important severity.\n\nThis flaw only affects configurations with mod_proxy loaded and being used. This module can be disabled via the configuration file if its functionality is not being used.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38477" }, { "category": "external", "summary": "RHBZ#2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T13:24:43+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4726" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: NULL pointer dereference in mod_proxy" }, { "cve": "CVE-2024-39573", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-07-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295022" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. A potential SSRF allows an attacker to cause unsafe rules used in the RewriteRule directive to unexpectedly set up URLs to be handled by the mod_proxy module.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Potential SSRF in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive.\n\nAdditionally, this flaw requires mod_rewrite and mod_proxy to be loaded and being used. These modules can be disabled via the configuration file if their functionality are not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-39573" }, { "category": "external", "summary": "RHBZ#2295022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295022" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-39573", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39573" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-39573", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39573" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-39573", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-39573" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T13:24:43+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4726" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:httpd-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-core-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-debugsource-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-devel-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-filesystem-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-manual-0:2.4.57-11.el9_4.noarch", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:httpd-tools-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ldap-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_lua-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_proxy_html-debuginfo-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_session-debuginfo-0:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-1:2.4.57-11.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:mod_ssl-debuginfo-1:2.4.57-11.el9_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: Potential SSRF in mod_rewrite" } ] }
rhsa-2024_5240
Vulnerability from csaf_redhat
Published
2024-08-13 13:06
Modified
2024-12-01 21:40
Summary
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.57 SP5 security update
Notes
Topic
Red Hat JBoss Core Services Apache HTTP Server 2.4.57 Service Pack 5 is now available.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products and packaged under Red Hat JBoss Core Services, to allow for faster distribution of updates and for a more consistent update experience.
This release of Red Hat JBoss Core Services Apache HTTP Server 2.4.57 Service Pack 5 serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.57 Service Pack 4, and includes bug fixes and enhancements, which are documented in the Release Notes linked to in the References section.
Security Fix(es):
* jbcs-httpd24-httpd: Potential SSRF in mod_rewrite (CVE-2024-39573)
* jbcs-httpd24-httpd: null pointer dereference in mod_proxy (CVE-2024-38477)
* jbcs-httpd24-httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)
* jbcs-httpd24-httpd: Encoding problem in mod_proxy (CVE-2024-38473)
* jbcs-httpd24-httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)
* jbcs-httpd24-httpd: Security issues via backend applications whose response headers are malicious or exploitable (CVE-2024-38476)
A Red Hat Security Bulletin which addresses further details about this flaw is available in the References section.
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss Core Services Apache HTTP Server 2.4.57 Service Pack 5 is now available.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products and packaged under Red Hat JBoss Core Services, to allow for faster distribution of updates and for a more consistent update experience.\n\nThis release of Red Hat JBoss Core Services Apache HTTP Server 2.4.57 Service Pack 5 serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.57 Service Pack 4, and includes bug fixes and enhancements, which are documented in the Release Notes linked to in the References section.\n\nSecurity Fix(es):\n\n* jbcs-httpd24-httpd: Potential SSRF in mod_rewrite (CVE-2024-39573)\n* jbcs-httpd24-httpd: null pointer dereference in mod_proxy (CVE-2024-38477)\n* jbcs-httpd24-httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)\n* jbcs-httpd24-httpd: Encoding problem in mod_proxy (CVE-2024-38473)\n* jbcs-httpd24-httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)\n* jbcs-httpd24-httpd: Security issues via backend applications whose response headers are malicious or exploitable (CVE-2024-38476)\n\nA Red Hat Security Bulletin which addresses further details about this flaw is available in the References section.\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:5240", "url": "https://access.redhat.com/errata/RHSA-2024:5240" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_core_services/2.4.57/html/red_hat_jboss_core_services_apache_http_server_2.4.57_service_pack_5_release_notes/index", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_core_services/2.4.57/html/red_hat_jboss_core_services_apache_http_server_2.4.57_service_pack_5_release_notes/index" }, { "category": "external", "summary": "2295012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295012" }, { "category": "external", "summary": "2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "2295015", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295015" }, { "category": "external", "summary": "2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "2295022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295022" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_5240.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.57 SP5 security update", "tracking": { "current_release_date": "2024-12-01T21:40:39+00:00", "generator": { "date": "2024-12-01T21:40:39+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:5240", "initial_release_date": "2024-08-13T13:06:23+00:00", "revision_history": [ { "date": "2024-08-13T13:06:23+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-08-13T13:06:24+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-01T21:40:39+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Core Services 1", "product": { "name": "Red Hat JBoss Core Services 1", "product_id": "Red Hat JBoss Core Services 1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1" } } } ], "category": "product_family", "name": "Red Hat JBoss Core Services" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38473", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:36+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295012" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. Due to an encoding problem, specially crafted request URLs with incorrect encoding can be sent to backend services, potentially bypassing authentication.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Encoding problem in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations where mechanisms other than ProxyPass/ProxyPassMatch or RewriteRule with the \u0027P\u0027 flag are used to configure a request to be proxied, such as SetHandler or inadvertent proxying via CVE-2024-39573. Note that these alternate mechanisms may be used within .htaccess files.\n\nFor more information about CVE-2024-39573, see https://access.redhat.com/security/cve/CVE-2024-39573.\n\nAdditionally, this flaw requires mod_proxy to be loaded and being used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38473" }, { "category": "external", "summary": "RHBZ#2295012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295012" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38473", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38473" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38473", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38473" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38473", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38473" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T13:06:23+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5240" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat JBoss Core Services 1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: Encoding problem in mod_proxy" }, { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:49+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295013" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Due to a substitution encoding issue, specially crafted requests may allow an attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant only to be executed as CGI.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Substitution encoding issue in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive. Also, to exploit this flaw, an attacker must be able to upload files to the server. For these reasons, this flaw was rated with an important and not critical severity.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38474" }, { "category": "external", "summary": "RHBZ#2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38474", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T13:06:23+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5240" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "Red Hat JBoss Core Services 1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Substitution encoding issue in mod_rewrite" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:22:02+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295014" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Improper escaping of output allows an attacker to map URLs to filesystem locations permitted to be served by the server but are not intentionally or directly reachable by any URL. This issue results in code execution or source code disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Improper escaping of output in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations with substitution rules used in the RewriteRule directive using backreferences or variables as the first segment of the substitution.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38475" }, { "category": "external", "summary": "RHBZ#2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38475", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T13:06:23+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5240" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "Red Hat JBoss Core Services 1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Improper escaping of output in mod_rewrite" }, { "cve": "CVE-2024-38476", "cwe": { "id": "CWE-829", "name": "Inclusion of Functionality from Untrusted Control Sphere" }, "discovery_date": "2024-07-01T19:22:16+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295015" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd. Backend applications whose response headers are malicious or exploitable may allow information disclosure, server-side request forgery (SSRF) or local script execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Security issues via\u00a0backend applications whose response headers are malicious or exploitable", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw can only be exploited by backend applications via malicious or exploitable response headers. For this reason, this flaw was rated with an important and not critical severity.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38476" }, { "category": "external", "summary": "RHBZ#2295015", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295015" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38476", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38476" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38476", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38476" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T13:06:23+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5240" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "Red Hat JBoss Core Services 1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Security issues via\u00a0backend applications whose response headers are malicious or exploitable" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-07-01T19:22:29+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295016" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. A NULL pointer dereference can be triggered when processing a specially crafted HTTP request, causing the httpd server to crash, and resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "As this flaw allows a remote attacker to cause a denial of service, it has been rated with an important severity.\n\nThis flaw only affects configurations with mod_proxy loaded and being used. This module can be disabled via the configuration file if its functionality is not being used.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38477" }, { "category": "external", "summary": "RHBZ#2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T13:06:23+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5240" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "Red Hat JBoss Core Services 1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: NULL pointer dereference in mod_proxy" }, { "cve": "CVE-2024-39573", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-07-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295022" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. A potential SSRF allows an attacker to cause unsafe rules used in the RewriteRule directive to unexpectedly set up URLs to be handled by the mod_proxy module.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Potential SSRF in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive.\n\nAdditionally, this flaw requires mod_rewrite and mod_proxy to be loaded and being used. These modules can be disabled via the configuration file if their functionality are not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-39573" }, { "category": "external", "summary": "RHBZ#2295022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295022" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-39573", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39573" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-39573", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39573" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-39573", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-39573" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T13:06:23+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5240" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat JBoss Core Services 1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: Potential SSRF in mod_rewrite" } ] }
rhsa-2024_4820
Vulnerability from csaf_redhat
Published
2024-07-24 12:40
Modified
2024-11-24 17:33
Summary
Red Hat Security Advisory: httpd:2.4 security update
Notes
Topic
An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)
* httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)
* httpd: NULL pointer dereference in mod_proxy (CVE-2024-38477)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)\n\n* httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)\n\n* httpd: NULL pointer dereference in mod_proxy (CVE-2024-38477)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4820", "url": "https://access.redhat.com/errata/RHSA-2024:4820" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4820.json" } ], "title": "Red Hat Security Advisory: httpd:2.4 security update", "tracking": { "current_release_date": "2024-11-24T17:33:33+00:00", "generator": { "date": "2024-11-24T17:33:33+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:4820", "initial_release_date": "2024-07-24T12:40:36+00:00", "revision_history": [ { "date": "2024-07-24T12:40:36+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-07-24T12:40:36+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T17:33:33+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_aus:8.2::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd:2.4:8020020240720043142:4cda2c84", "product": { "name": "httpd:2.4:8020020240720043142:4cda2c84", "product_id": "httpd:2.4:8020020240720043142:4cda2c84", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/httpd@2.4:8020020240720043142:4cda2c84" } } }, { "category": "product_version", "name": "httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "product": { "name": "httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "product_id": "httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=noarch" } } }, { "category": "product_version", "name": "httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "product": { "name": "httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "product_id": "httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "product": { "name": "httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "product_id": "httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=src" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "product": { "name": "mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "product_id": "mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.2.0%2B22123%2Bcf5a147c.4?arch=src" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "product": { "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "product_id": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "product": { "name": "mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "product_id": "mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.2.0%2B22123%2Bcf5a147c.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "product": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "product_id": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-3.module%2Bel8.2.0%2B22123%2Bcf5a147c.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "product": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "product_id": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-3.module%2Bel8.2.0%2B22123%2Bcf5a147c.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product": { "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product_id": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product": { "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product_id": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product": { "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product_id": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-7.module%2Bel8.2.0%2B5531%2B7e4d69a2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_id": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-21.module%2Bel8.2.0%2B22128%2B68c62a5c.8?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, "product_reference": "httpd:2.4:8020020240720043142:4cda2c84", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src" }, "product_reference": "httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch" }, "product_reference": "httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src" }, "product_reference": "mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64" }, "product_reference": "mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src" }, "product_reference": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64" }, "product_reference": "mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64" }, "product_reference": "mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64 as a component of httpd:2.4:8020020240720043142:4cda2c84 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:49+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295013" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Due to a substitution encoding issue, specially crafted requests may allow an attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant only to be executed as CGI.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Substitution encoding issue in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive. Also, to exploit this flaw, an attacker must be able to upload files to the server. For these reasons, this flaw was rated with an important and not critical severity.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38474" }, { "category": "external", "summary": "RHBZ#2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38474", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-24T12:40:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4820" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Substitution encoding issue in mod_rewrite" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:22:02+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295014" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Improper escaping of output allows an attacker to map URLs to filesystem locations permitted to be served by the server but are not intentionally or directly reachable by any URL. This issue results in code execution or source code disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Improper escaping of output in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations with substitution rules used in the RewriteRule directive using backreferences or variables as the first segment of the substitution.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38475" }, { "category": "external", "summary": "RHBZ#2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38475", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-24T12:40:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4820" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Improper escaping of output in mod_rewrite" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-07-01T19:22:29+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295016" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. A NULL pointer dereference can be triggered when processing a specially crafted HTTP request, causing the httpd server to crash, and resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "As this flaw allows a remote attacker to cause a denial of service, it has been rated with an important severity.\n\nThis flaw only affects configurations with mod_proxy loaded and being used. This module can be disabled via the configuration file if its functionality is not being used.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38477" }, { "category": "external", "summary": "RHBZ#2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-24T12:40:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4820" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-debugsource-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-devel-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-filesystem-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-manual-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.noarch", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:httpd-tools-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debuginfo-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_http2-debugsource-0:1.11.3-3.module+el8.2.0+22123+cf5a147c.4.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ldap-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.src", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debuginfo-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_md-debugsource-1:2.0.8-7.module+el8.2.0+5531+7e4d69a2.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_proxy_html-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_session-debuginfo-0:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64", "AppStream-8.2.0.Z.AUS:httpd:2.4:8020020240720043142:4cda2c84:mod_ssl-debuginfo-1:2.4.37-21.module+el8.2.0+22128+68c62a5c.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: NULL pointer dereference in mod_proxy" } ] }
rhsa-2024_4720
Vulnerability from csaf_redhat
Published
2024-07-23 08:57
Modified
2024-11-24 17:32
Summary
Red Hat Security Advisory: httpd:2.4 security update
Notes
Topic
An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: Encoding problem in mod_proxy (CVE-2024-38473)
* httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)
* httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)
* httpd: NULL pointer dereference in mod_proxy (CVE-2024-38477)
* httpd: Potential SSRF in mod_rewrite (CVE-2024-39573)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Encoding problem in mod_proxy (CVE-2024-38473)\n\n* httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)\n\n* httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)\n\n* httpd: NULL pointer dereference in mod_proxy (CVE-2024-38477)\n\n* httpd: Potential SSRF in mod_rewrite (CVE-2024-39573)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4720", "url": "https://access.redhat.com/errata/RHSA-2024:4720" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2295012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295012" }, { "category": "external", "summary": "2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "2295022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295022" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4720.json" } ], "title": "Red Hat Security Advisory: httpd:2.4 security update", "tracking": { "current_release_date": "2024-11-24T17:32:42+00:00", "generator": { "date": "2024-11-24T17:32:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:4720", "initial_release_date": "2024-07-23T08:57:47+00:00", "revision_history": [ { "date": "2024-07-23T08:57:47+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-07-23T08:57:47+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T17:32:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd:2.4:8100020240712114234:489197e6", "product": { "name": "httpd:2.4:8100020240712114234:489197e6", "product_id": "httpd:2.4:8100020240712114234:489197e6", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/httpd@2.4:8100020240712114234:489197e6" } } }, { "category": "product_version", "name": "httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "product": { "name": "httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "product_id": "httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=noarch" } } }, { "category": "product_version", "name": "httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "product": { "name": "httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "product_id": "httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "product": { "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "product_id": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=src" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "product": { "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "product_id": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=src" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "product": { "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "product_id": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "product": { "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "product_id": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "product": { "name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "product_id": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "product": { "name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "product_id": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "product": { "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "product_id": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_id": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "product": { "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "product_id": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "product": { "name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "product_id": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "product": { "name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "product_id": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "product": { "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "product_id": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_id": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "product": { "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "product_id": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "product": { "name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "product_id": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "product": { "name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "product_id": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "product": { "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "product_id": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_id": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "product": { "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "product_id": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "product": { "name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "product_id": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "product": { "name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "product_id": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-10.module%2Bel8.10.0%2B21653%2Beaff63f0?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "product": { "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "product_id": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.9.0%2B19080%2B567b90f8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_id": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-65.module%2Bel8.10.0%2B22069%2Bb47f5c72.1?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, "product_reference": "httpd:2.4:8100020240712114234:489197e6", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src" }, "product_reference": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch" }, "product_reference": "httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64" }, "product_reference": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le" }, "product_reference": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x" }, "product_reference": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src" }, "product_reference": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64" }, "product_reference": "mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le" }, "product_reference": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x" }, "product_reference": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64 as a component of httpd:2.4:8100020240712114234:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38473", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:36+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295012" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. Due to an encoding problem, specially crafted request URLs with incorrect encoding can be sent to backend services, potentially bypassing authentication.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Encoding problem in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations where mechanisms other than ProxyPass/ProxyPassMatch or RewriteRule with the \u0027P\u0027 flag are used to configure a request to be proxied, such as SetHandler or inadvertent proxying via CVE-2024-39573. Note that these alternate mechanisms may be used within .htaccess files.\n\nFor more information about CVE-2024-39573, see https://access.redhat.com/security/cve/CVE-2024-39573.\n\nAdditionally, this flaw requires mod_proxy to be loaded and being used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38473" }, { "category": "external", "summary": "RHBZ#2295012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295012" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38473", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38473" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38473", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38473" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38473", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38473" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T08:57:47+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4720" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: Encoding problem in mod_proxy" }, { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:49+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295013" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Due to a substitution encoding issue, specially crafted requests may allow an attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant only to be executed as CGI.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Substitution encoding issue in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive. Also, to exploit this flaw, an attacker must be able to upload files to the server. For these reasons, this flaw was rated with an important and not critical severity.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38474" }, { "category": "external", "summary": "RHBZ#2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38474", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T08:57:47+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4720" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Substitution encoding issue in mod_rewrite" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:22:02+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295014" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Improper escaping of output allows an attacker to map URLs to filesystem locations permitted to be served by the server but are not intentionally or directly reachable by any URL. This issue results in code execution or source code disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Improper escaping of output in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations with substitution rules used in the RewriteRule directive using backreferences or variables as the first segment of the substitution.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38475" }, { "category": "external", "summary": "RHBZ#2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38475", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T08:57:47+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4720" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Improper escaping of output in mod_rewrite" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-07-01T19:22:29+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295016" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. A NULL pointer dereference can be triggered when processing a specially crafted HTTP request, causing the httpd server to crash, and resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "As this flaw allows a remote attacker to cause a denial of service, it has been rated with an important severity.\n\nThis flaw only affects configurations with mod_proxy loaded and being used. This module can be disabled via the configuration file if its functionality is not being used.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38477" }, { "category": "external", "summary": "RHBZ#2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T08:57:47+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4720" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: NULL pointer dereference in mod_proxy" }, { "cve": "CVE-2024-39573", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-07-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295022" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. A potential SSRF allows an attacker to cause unsafe rules used in the RewriteRule directive to unexpectedly set up URLs to be handled by the mod_proxy module.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Potential SSRF in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive.\n\nAdditionally, this flaw requires mod_rewrite and mod_proxy to be loaded and being used. These modules can be disabled via the configuration file if their functionality are not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-39573" }, { "category": "external", "summary": "RHBZ#2295022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295022" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-39573", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39573" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-39573", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39573" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-39573", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-39573" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T08:57:47+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4720" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-debugsource-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-devel-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-filesystem-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-manual-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.noarch", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:httpd-tools-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debuginfo-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_http2-debugsource-0:1.15.7-10.module+el8.10.0+21653+eaff63f0.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ldap-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.src", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debuginfo-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_md-debugsource-1:2.0.8-8.module+el8.9.0+19080+567b90f8.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_proxy_html-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_session-debuginfo-0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.s390x", "AppStream-8.10.0.Z.MAIN.EUS:httpd:2.4:8100020240712114234:489197e6:mod_ssl-debuginfo-1:2.4.37-65.module+el8.10.0+22069+b47f5c72.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: Potential SSRF in mod_rewrite" } ] }
rhsa-2024_4862
Vulnerability from csaf_redhat
Published
2024-07-25 08:41
Modified
2024-11-24 17:33
Summary
Red Hat Security Advisory: httpd security update
Notes
Topic
An update for httpd is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)
* httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)
* httpd: NULL pointer dereference in mod_proxy (CVE-2024-38477)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for httpd is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)\n\n* httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)\n\n* httpd: NULL pointer dereference in mod_proxy (CVE-2024-38477)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4862", "url": "https://access.redhat.com/errata/RHSA-2024:4862" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4862.json" } ], "title": "Red Hat Security Advisory: httpd security update", "tracking": { "current_release_date": "2024-11-24T17:33:42+00:00", "generator": { "date": "2024-11-24T17:33:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:4862", "initial_release_date": "2024-07-25T08:41:39+00:00", "revision_history": [ { "date": "2024-07-25T08:41:39+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-07-25T08:41:39+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T17:33:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:9.2::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.53-11.el9_2.8.src", "product": { "name": "httpd-0:2.4.53-11.el9_2.8.src", "product_id": "httpd-0:2.4.53-11.el9_2.8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.53-11.el9_2.8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "httpd-0:2.4.53-11.el9_2.8.aarch64", "product_id": "httpd-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-core-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "httpd-core-0:2.4.53-11.el9_2.8.aarch64", "product_id": "httpd-core-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "product_id": "httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "product_id": "httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "product_id": "mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "mod_lua-0:2.4.53-11.el9_2.8.aarch64", "product_id": "mod_lua-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "product": { "name": "mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "product_id": "mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.53-11.el9_2.8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "mod_session-0:2.4.53-11.el9_2.8.aarch64", "product_id": "mod_session-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "product": { "name": "mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "product_id": "mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "product_id": "httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product_id": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core-debuginfo@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product_id": "httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product_id": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product_id": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product_id": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "product_id": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.53-11.el9_2.8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product": { "name": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product_id": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.53-11.el9_2.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "product": { "name": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "product_id": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.53-11.el9_2.8?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "httpd-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "httpd-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "product_id": "mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.53-11.el9_2.8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "mod_session-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "mod_session-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "product_id": "mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core-debuginfo@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "product_id": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.53-11.el9_2.8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product_id": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.53-11.el9_2.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "product": { "name": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "product_id": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.53-11.el9_2.8?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "httpd-0:2.4.53-11.el9_2.8.x86_64", "product_id": "httpd-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-core-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "httpd-core-0:2.4.53-11.el9_2.8.x86_64", "product_id": "httpd-core-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "product_id": "httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "product_id": "httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "product_id": "mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "mod_lua-0:2.4.53-11.el9_2.8.x86_64", "product_id": "mod_lua-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "product": { "name": "mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "product_id": "mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.53-11.el9_2.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "mod_session-0:2.4.53-11.el9_2.8.x86_64", "product_id": "mod_session-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "product": { "name": "mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "product_id": "mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "product_id": "httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product_id": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core-debuginfo@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product_id": "httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product_id": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product_id": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product_id": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "product_id": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.53-11.el9_2.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product": { "name": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product_id": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.53-11.el9_2.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "product": { "name": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "product_id": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.53-11.el9_2.8?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "httpd-0:2.4.53-11.el9_2.8.s390x", "product_id": "httpd-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "httpd-core-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "httpd-core-0:2.4.53-11.el9_2.8.s390x", "product_id": "httpd-core-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "httpd-devel-0:2.4.53-11.el9_2.8.s390x", "product_id": "httpd-devel-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "httpd-tools-0:2.4.53-11.el9_2.8.s390x", "product_id": "httpd-tools-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "mod_ldap-0:2.4.53-11.el9_2.8.s390x", "product_id": "mod_ldap-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "mod_lua-0:2.4.53-11.el9_2.8.s390x", "product_id": "mod_lua-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "product": { "name": "mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "product_id": "mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.53-11.el9_2.8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "mod_session-0:2.4.53-11.el9_2.8.s390x", "product_id": "mod_session-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.53-11.el9_2.8.s390x", "product": { "name": "mod_ssl-1:2.4.53-11.el9_2.8.s390x", "product_id": "mod_ssl-1:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.53-11.el9_2.8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "product_id": "httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product_id": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core-debuginfo@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product_id": "httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product_id": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product_id": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product_id": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "product_id": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.53-11.el9_2.8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product": { "name": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product_id": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.53-11.el9_2.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "product": { "name": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "product_id": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.53-11.el9_2.8?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "product": { "name": "httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "product_id": "httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.53-11.el9_2.8?arch=noarch" } } }, { "category": "product_version", "name": "httpd-manual-0:2.4.53-11.el9_2.8.noarch", "product": { "name": "httpd-manual-0:2.4.53-11.el9_2.8.noarch", "product_id": "httpd-manual-0:2.4.53-11.el9_2.8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.53-11.el9_2.8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "httpd-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "httpd-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "httpd-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.53-11.el9_2.8.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src" }, "product_reference": "httpd-0:2.4.53-11.el9_2.8.src", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "httpd-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "httpd-core-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "httpd-core-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "httpd-core-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "httpd-devel-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.53-11.el9_2.8.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch" }, "product_reference": "httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.53-11.el9_2.8.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch" }, "product_reference": "httpd-manual-0:2.4.53-11.el9_2.8.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "httpd-tools-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "mod_ldap-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "mod_lua-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "mod_lua-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "mod_lua-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x" }, "product_reference": "mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "mod_session-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "mod_session-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "mod_session-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "mod_session-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x" }, "product_reference": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x" }, "product_reference": "mod_ssl-1:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le" }, "product_reference": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x" }, "product_reference": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:49+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295013" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Due to a substitution encoding issue, specially crafted requests may allow an attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant only to be executed as CGI.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Substitution encoding issue in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive. Also, to exploit this flaw, an attacker must be able to upload files to the server. For these reasons, this flaw was rated with an important and not critical severity.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38474" }, { "category": "external", "summary": "RHBZ#2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38474", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-25T08:41:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4862" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Substitution encoding issue in mod_rewrite" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:22:02+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295014" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Improper escaping of output allows an attacker to map URLs to filesystem locations permitted to be served by the server but are not intentionally or directly reachable by any URL. This issue results in code execution or source code disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Improper escaping of output in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations with substitution rules used in the RewriteRule directive using backreferences or variables as the first segment of the substitution.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38475" }, { "category": "external", "summary": "RHBZ#2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38475", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-25T08:41:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4862" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Improper escaping of output in mod_rewrite" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-07-01T19:22:29+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295016" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. A NULL pointer dereference can be triggered when processing a specially crafted HTTP request, causing the httpd server to crash, and resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "As this flaw allows a remote attacker to cause a denial of service, it has been rated with an important severity.\n\nThis flaw only affects configurations with mod_proxy loaded and being used. This module can be disabled via the configuration file if its functionality is not being used.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38477" }, { "category": "external", "summary": "RHBZ#2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-25T08:41:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4862" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.src", "AppStream-9.2.0.Z.EUS:httpd-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-core-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-debugsource-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-devel-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-filesystem-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-manual-0:2.4.53-11.el9_2.8.noarch", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:httpd-tools-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ldap-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_lua-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_proxy_html-debuginfo-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_session-debuginfo-0:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-1:2.4.53-11.el9_2.8.x86_64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.aarch64", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.ppc64le", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.s390x", "AppStream-9.2.0.Z.EUS:mod_ssl-debuginfo-1:2.4.53-11.el9_2.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: NULL pointer dereference in mod_proxy" } ] }
rhsa-2024_4830
Vulnerability from csaf_redhat
Published
2024-07-24 14:05
Modified
2024-11-24 17:33
Summary
Red Hat Security Advisory: httpd:2.4 security update
Notes
Topic
An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.4 Telecommunications Update Service.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)
* httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)
* httpd: NULL pointer dereference in mod_proxy (CVE-2024-38477)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.4 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)\n\n* httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)\n\n* httpd: NULL pointer dereference in mod_proxy (CVE-2024-38477)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4830", "url": "https://access.redhat.com/errata/RHSA-2024:4830" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4830.json" } ], "title": "Red Hat Security Advisory: httpd:2.4 security update", "tracking": { "current_release_date": "2024-11-24T17:33:23+00:00", "generator": { "date": "2024-11-24T17:33:23+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:4830", "initial_release_date": "2024-07-24T14:05:13+00:00", "revision_history": [ { "date": "2024-07-24T14:05:13+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-07-24T14:05:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T17:33:23+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product": { "name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_aus:8.4::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:8.4::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product": { "name": "Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_tus:8.4::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd:2.4:8040020240720035525:522a0ee4", "product": { "name": "httpd:2.4:8040020240720035525:522a0ee4", "product_id": "httpd:2.4:8040020240720035525:522a0ee4", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/httpd@2.4:8040020240720035525:522a0ee4" } } }, { "category": "product_version", "name": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "product": { "name": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "product_id": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=noarch" } } }, { "category": "product_version", "name": "httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "product": { "name": "httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "product_id": "httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "product": { "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "product_id": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=src" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "product": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "product_id": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B21747%2B916a74df.3?arch=src" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "product": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "product_id": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B21747%2B916a74df.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "product": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "product_id": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-3.module%2Bel8.4.0%2B21747%2B916a74df.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "product": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "product_id": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-3.module%2Bel8.4.0%2B21747%2B916a74df.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_id": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "product": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "product_id": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-3.module%2Bel8.4.0%2B21747%2B916a74df.3?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "product": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "product_id": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-3.module%2Bel8.4.0%2B21747%2B916a74df.3?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "product": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "product_id": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-3.module%2Bel8.4.0%2B21747%2B916a74df.3?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_id": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-39.module%2Bel8.4.0%2B22127%2B467cc488.8?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, "product_reference": "httpd:2.4:8040020240720035525:522a0ee4", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src" }, "product_reference": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch" }, "product_reference": "httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, "product_reference": "httpd:2.4:8040020240720035525:522a0ee4", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src" }, "product_reference": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch" }, "product_reference": "httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le" }, "product_reference": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, "product_reference": "httpd:2.4:8040020240720035525:522a0ee4", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src" }, "product_reference": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch" }, "product_reference": "httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64" }, "product_reference": "mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64 as a component of httpd:2.4:8040020240720035525:522a0ee4 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:49+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295013" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Due to a substitution encoding issue, specially crafted requests may allow an attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant only to be executed as CGI.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Substitution encoding issue in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive. Also, to exploit this flaw, an attacker must be able to upload files to the server. For these reasons, this flaw was rated with an important and not critical severity.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38474" }, { "category": "external", "summary": "RHBZ#2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38474", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-24T14:05:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4830" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Substitution encoding issue in mod_rewrite" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:22:02+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295014" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Improper escaping of output allows an attacker to map URLs to filesystem locations permitted to be served by the server but are not intentionally or directly reachable by any URL. This issue results in code execution or source code disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Improper escaping of output in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations with substitution rules used in the RewriteRule directive using backreferences or variables as the first segment of the substitution.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38475" }, { "category": "external", "summary": "RHBZ#2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38475", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-24T14:05:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4830" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Improper escaping of output in mod_rewrite" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-07-01T19:22:29+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295016" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. A NULL pointer dereference can be triggered when processing a specially crafted HTTP request, causing the httpd server to crash, and resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "As this flaw allows a remote attacker to cause a denial of service, it has been rated with an important severity.\n\nThis flaw only affects configurations with mod_proxy loaded and being used. This module can be disabled via the configuration file if its functionality is not being used.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38477" }, { "category": "external", "summary": "RHBZ#2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-24T14:05:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4830" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.AUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.ppc64le", "AppStream-8.4.0.Z.E4S:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-debugsource-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-devel-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-filesystem-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-manual-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.noarch", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:httpd-tools-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debuginfo-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_http2-debugsource-0:1.15.7-3.module+el8.4.0+21747+916a74df.3.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ldap-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_proxy_html-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_session-debuginfo-0:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64", "AppStream-8.4.0.Z.TUS:httpd:2.4:8040020240720035525:522a0ee4:mod_ssl-debuginfo-1:2.4.37-39.module+el8.4.0+22127+467cc488.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: NULL pointer dereference in mod_proxy" } ] }
rhsa-2024_4943
Vulnerability from csaf_redhat
Published
2024-07-31 14:59
Modified
2024-11-24 17:34
Summary
Red Hat Security Advisory: httpd security update
Notes
Topic
An update for httpd is now available for Red Hat Enterprise Linux 7 Extended Lifecycle Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for httpd is now available for Red Hat Enterprise Linux 7 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4943", "url": "https://access.redhat.com/errata/RHSA-2024:4943" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4943.json" } ], "title": "Red Hat Security Advisory: httpd security update", "tracking": { "current_release_date": "2024-11-24T17:34:11+00:00", "generator": { "date": "2024-11-24T17:34:11+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:4943", "initial_release_date": "2024-07-31T14:59:20+00:00", "revision_history": [ { "date": "2024-07-31T14:59:20+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-07-31T14:59:20+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T17:34:11+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7 ELS)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_els:7" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_els:7" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-99.el7_9.2.src", "product": { "name": "httpd-0:2.4.6-99.el7_9.2.src", "product_id": "httpd-0:2.4.6-99.el7_9.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-99.el7_9.2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-99.el7_9.2.x86_64", "product": { "name": "httpd-0:2.4.6-99.el7_9.2.x86_64", "product_id": "httpd-0:2.4.6-99.el7_9.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-99.el7_9.2?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "product": { "name": "httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "product_id": "httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-99.el7_9.2?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "product": { "name": "httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "product_id": "httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-99.el7_9.2?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-99.el7_9.2.x86_64", "product": { "name": "mod_session-0:2.4.6-99.el7_9.2.x86_64", "product_id": "mod_session-0:2.4.6-99.el7_9.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-99.el7_9.2?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "product": { "name": "mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "product_id": "mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-99.el7_9.2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "product_id": "httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-99.el7_9.2?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "product": { "name": "mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "product_id": "mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-99.el7_9.2?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "product": { "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "product_id": "mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-99.el7_9.2?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-99.el7_9.2.ppc64le", "product": { "name": "httpd-0:2.4.6-99.el7_9.2.ppc64le", "product_id": "httpd-0:2.4.6-99.el7_9.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-99.el7_9.2?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "product": { "name": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "product_id": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-99.el7_9.2?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "product": { "name": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "product_id": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-99.el7_9.2?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-99.el7_9.2.ppc64le", "product": { "name": "mod_session-0:2.4.6-99.el7_9.2.ppc64le", "product_id": "mod_session-0:2.4.6-99.el7_9.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-99.el7_9.2?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "product": { "name": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "product_id": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-99.el7_9.2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "product_id": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-99.el7_9.2?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "product": { "name": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "product_id": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-99.el7_9.2?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "product_id": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-99.el7_9.2?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-99.el7_9.2.ppc64", "product": { "name": "httpd-0:2.4.6-99.el7_9.2.ppc64", "product_id": "httpd-0:2.4.6-99.el7_9.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-99.el7_9.2?arch=ppc64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "product": { "name": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "product_id": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-99.el7_9.2?arch=ppc64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "product": { "name": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "product_id": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-99.el7_9.2?arch=ppc64" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-99.el7_9.2.ppc64", "product": { "name": "mod_session-0:2.4.6-99.el7_9.2.ppc64", "product_id": "mod_session-0:2.4.6-99.el7_9.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-99.el7_9.2?arch=ppc64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "product": { "name": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "product_id": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-99.el7_9.2?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "product": { "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "product_id": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-99.el7_9.2?arch=ppc64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "product": { "name": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "product_id": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-99.el7_9.2?arch=ppc64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "product": { "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "product_id": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-99.el7_9.2?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-99.el7_9.2.s390x", "product": { "name": "httpd-0:2.4.6-99.el7_9.2.s390x", "product_id": "httpd-0:2.4.6-99.el7_9.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-99.el7_9.2?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-99.el7_9.2.s390x", "product": { "name": "httpd-devel-0:2.4.6-99.el7_9.2.s390x", "product_id": "httpd-devel-0:2.4.6-99.el7_9.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-99.el7_9.2?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-99.el7_9.2.s390x", "product": { "name": "httpd-tools-0:2.4.6-99.el7_9.2.s390x", "product_id": "httpd-tools-0:2.4.6-99.el7_9.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-99.el7_9.2?arch=s390x" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-99.el7_9.2.s390x", "product": { "name": "mod_session-0:2.4.6-99.el7_9.2.s390x", "product_id": "mod_session-0:2.4.6-99.el7_9.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-99.el7_9.2?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-99.el7_9.2.s390x", "product": { "name": "mod_ssl-1:2.4.6-99.el7_9.2.s390x", "product_id": "mod_ssl-1:2.4.6-99.el7_9.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-99.el7_9.2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "product": { "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "product_id": "httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-99.el7_9.2?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-99.el7_9.2.s390x", "product": { "name": "mod_ldap-0:2.4.6-99.el7_9.2.s390x", "product_id": "mod_ldap-0:2.4.6-99.el7_9.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-99.el7_9.2?arch=s390x" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "product": { "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "product_id": "mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-99.el7_9.2?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-manual-0:2.4.6-99.el7_9.2.noarch", "product": { "name": "httpd-manual-0:2.4.6-99.el7_9.2.noarch", "product_id": "httpd-manual-0:2.4.6-99.el7_9.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-99.el7_9.2?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "httpd-0:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "httpd-0:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x" }, "product_reference": "httpd-0:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-99.el7_9.2.src as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src" }, "product_reference": "httpd-0:2.4.6-99.el7_9.2.src", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "httpd-0:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x" }, "product_reference": "httpd-devel-0:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-99.el7_9.2.noarch as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch" }, "product_reference": "httpd-manual-0:2.4.6-99.el7_9.2.noarch", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x" }, "product_reference": "httpd-tools-0:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x" }, "product_reference": "mod_ldap-0:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x" }, "product_reference": "mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "mod_session-0:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "mod_session-0:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x" }, "product_reference": "mod_session-0:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "mod_session-0:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x" }, "product_reference": "mod_ssl-1:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "httpd-0:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "httpd-0:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x" }, "product_reference": "httpd-0:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-99.el7_9.2.src as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src" }, "product_reference": "httpd-0:2.4.6-99.el7_9.2.src", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "httpd-0:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x" }, "product_reference": "httpd-devel-0:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-99.el7_9.2.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch" }, "product_reference": "httpd-manual-0:2.4.6-99.el7_9.2.noarch", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x" }, "product_reference": "httpd-tools-0:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x" }, "product_reference": "mod_ldap-0:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x" }, "product_reference": "mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "mod_session-0:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "mod_session-0:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x" }, "product_reference": "mod_session-0:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "mod_session-0:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64" }, "product_reference": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le" }, "product_reference": "mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-99.el7_9.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x" }, "product_reference": "mod_ssl-1:2.4.6-99.el7_9.2.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-99.el7_9.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "relates_to_product_reference": "7Server-optional-ELS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:49+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295013" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Due to a substitution encoding issue, specially crafted requests may allow an attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant only to be executed as CGI.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Substitution encoding issue in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive. Also, to exploit this flaw, an attacker must be able to upload files to the server. For these reasons, this flaw was rated with an important and not critical severity.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38474" }, { "category": "external", "summary": "RHBZ#2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38474", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-31T14:59:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4943" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Substitution encoding issue in mod_rewrite" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:22:02+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295014" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Improper escaping of output allows an attacker to map URLs to filesystem locations permitted to be served by the server but are not intentionally or directly reachable by any URL. This issue results in code execution or source code disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Improper escaping of output in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations with substitution rules used in the RewriteRule directive using backreferences or variables as the first segment of the substitution.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38475" }, { "category": "external", "summary": "RHBZ#2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38475", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-31T14:59:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4943" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Improper escaping of output in mod_rewrite" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-07-01T19:22:29+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295016" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. A NULL pointer dereference can be triggered when processing a specially crafted HTTP request, causing the httpd server to crash, and resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "As this flaw allows a remote attacker to cause a denial of service, it has been rated with an important severity.\n\nThis flaw only affects configurations with mod_proxy loaded and being used. This module can be disabled via the configuration file if its functionality is not being used.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38477" }, { "category": "external", "summary": "RHBZ#2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-31T14:59:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4943" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.src", "7Server-optional-ELS:httpd-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-debuginfo-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-devel-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:httpd-manual-0:2.4.6-99.el7_9.2.noarch", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:httpd-tools-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ldap-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_proxy_html-1:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_session-0:2.4.6-99.el7_9.2.x86_64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.ppc64le", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.s390x", "7Server-optional-ELS:mod_ssl-1:2.4.6-99.el7_9.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: NULL pointer dereference in mod_proxy" } ] }
rhsa-2024_4863
Vulnerability from csaf_redhat
Published
2024-07-25 08:34
Modified
2024-11-24 17:33
Summary
Red Hat Security Advisory: httpd security update
Notes
Topic
An update for httpd is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)
* httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)
* httpd: NULL pointer dereference in mod_proxy (CVE-2024-38477)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for httpd is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)\n\n* httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)\n\n* httpd: NULL pointer dereference in mod_proxy (CVE-2024-38477)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4863", "url": "https://access.redhat.com/errata/RHSA-2024:4863" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4863.json" } ], "title": "Red Hat Security Advisory: httpd security update", "tracking": { "current_release_date": "2024-11-24T17:33:51+00:00", "generator": { "date": "2024-11-24T17:33:51+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:4863", "initial_release_date": "2024-07-25T08:34:04+00:00", "revision_history": [ { "date": "2024-07-25T08:34:04+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-07-25T08:34:04+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T17:33:51+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:9.0::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.51-7.el9_0.7.src", "product": { "name": "httpd-0:2.4.51-7.el9_0.7.src", "product_id": "httpd-0:2.4.51-7.el9_0.7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.51-7.el9_0.7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.51-7.el9_0.7.aarch64", "product": { "name": "httpd-0:2.4.51-7.el9_0.7.aarch64", "product_id": "httpd-0:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.51-7.el9_0.7?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "product": { "name": "httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "product_id": "httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.51-7.el9_0.7?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "product": { "name": "httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "product_id": "httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.51-7.el9_0.7?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "product": { "name": "mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "product_id": "mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.51-7.el9_0.7?arch=aarch64" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.51-7.el9_0.7.aarch64", "product": { "name": "mod_lua-0:2.4.51-7.el9_0.7.aarch64", "product_id": "mod_lua-0:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.51-7.el9_0.7?arch=aarch64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "product": { "name": "mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "product_id": "mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.51-7.el9_0.7?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.51-7.el9_0.7.aarch64", "product": { "name": "mod_session-0:2.4.51-7.el9_0.7.aarch64", "product_id": "mod_session-0:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.51-7.el9_0.7?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "product": { "name": "mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "product_id": "mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.51-7.el9_0.7?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "product": { "name": "httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "product_id": "httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.51-7.el9_0.7?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product": { "name": "httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product_id": "httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.51-7.el9_0.7?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product": { "name": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product_id": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.51-7.el9_0.7?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product": { "name": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product_id": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.51-7.el9_0.7?arch=aarch64" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product": { "name": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product_id": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.51-7.el9_0.7?arch=aarch64" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "product_id": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.51-7.el9_0.7?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product": { "name": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product_id": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.51-7.el9_0.7?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "product": { "name": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "product_id": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.51-7.el9_0.7?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "httpd-0:2.4.51-7.el9_0.7.ppc64le", "product_id": "httpd-0:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.51-7.el9_0.7?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "product_id": "httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.51-7.el9_0.7?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "product_id": "httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.51-7.el9_0.7?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "product_id": "mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.51-7.el9_0.7?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "product_id": "mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.51-7.el9_0.7?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "product_id": "mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.51-7.el9_0.7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "mod_session-0:2.4.51-7.el9_0.7.ppc64le", "product_id": "mod_session-0:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.51-7.el9_0.7?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "product_id": "mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.51-7.el9_0.7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "product_id": "httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.51-7.el9_0.7?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product_id": "httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.51-7.el9_0.7?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product_id": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.51-7.el9_0.7?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product_id": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.51-7.el9_0.7?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product_id": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.51-7.el9_0.7?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "product_id": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.51-7.el9_0.7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product_id": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.51-7.el9_0.7?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "product": { "name": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "product_id": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.51-7.el9_0.7?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.51-7.el9_0.7.x86_64", "product": { "name": "httpd-0:2.4.51-7.el9_0.7.x86_64", "product_id": "httpd-0:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.51-7.el9_0.7?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "product": { "name": "httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "product_id": "httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.51-7.el9_0.7?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "product": { "name": "httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "product_id": "httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.51-7.el9_0.7?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "product": { "name": "mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "product_id": "mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.51-7.el9_0.7?arch=x86_64" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.51-7.el9_0.7.x86_64", "product": { "name": "mod_lua-0:2.4.51-7.el9_0.7.x86_64", "product_id": "mod_lua-0:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.51-7.el9_0.7?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "product": { "name": "mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "product_id": "mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.51-7.el9_0.7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.51-7.el9_0.7.x86_64", "product": { "name": "mod_session-0:2.4.51-7.el9_0.7.x86_64", "product_id": "mod_session-0:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.51-7.el9_0.7?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "product": { "name": "mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "product_id": "mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.51-7.el9_0.7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "product": { "name": "httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "product_id": "httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.51-7.el9_0.7?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product_id": "httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.51-7.el9_0.7?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product": { "name": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product_id": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.51-7.el9_0.7?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product": { "name": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product_id": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.51-7.el9_0.7?arch=x86_64" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product": { "name": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product_id": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.51-7.el9_0.7?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "product_id": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.51-7.el9_0.7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product": { "name": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product_id": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.51-7.el9_0.7?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "product": { "name": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "product_id": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.51-7.el9_0.7?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.51-7.el9_0.7.s390x", "product": { "name": "httpd-0:2.4.51-7.el9_0.7.s390x", "product_id": "httpd-0:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.51-7.el9_0.7?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.51-7.el9_0.7.s390x", "product": { "name": "httpd-devel-0:2.4.51-7.el9_0.7.s390x", "product_id": "httpd-devel-0:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.51-7.el9_0.7?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.51-7.el9_0.7.s390x", "product": { "name": "httpd-tools-0:2.4.51-7.el9_0.7.s390x", "product_id": "httpd-tools-0:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.51-7.el9_0.7?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.51-7.el9_0.7.s390x", "product": { "name": "mod_ldap-0:2.4.51-7.el9_0.7.s390x", "product_id": "mod_ldap-0:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.51-7.el9_0.7?arch=s390x" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.51-7.el9_0.7.s390x", "product": { "name": "mod_lua-0:2.4.51-7.el9_0.7.s390x", "product_id": "mod_lua-0:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.51-7.el9_0.7?arch=s390x" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "product": { "name": "mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "product_id": "mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.51-7.el9_0.7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.51-7.el9_0.7.s390x", "product": { "name": "mod_session-0:2.4.51-7.el9_0.7.s390x", "product_id": "mod_session-0:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.51-7.el9_0.7?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.51-7.el9_0.7.s390x", "product": { "name": "mod_ssl-1:2.4.51-7.el9_0.7.s390x", "product_id": "mod_ssl-1:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.51-7.el9_0.7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "product": { "name": "httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "product_id": "httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.51-7.el9_0.7?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product": { "name": "httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product_id": "httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.51-7.el9_0.7?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product": { "name": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product_id": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.51-7.el9_0.7?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product": { "name": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product_id": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.51-7.el9_0.7?arch=s390x" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product": { "name": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product_id": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.51-7.el9_0.7?arch=s390x" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "product_id": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.51-7.el9_0.7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product": { "name": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product_id": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.51-7.el9_0.7?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "product": { "name": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "product_id": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.51-7.el9_0.7?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "product": { "name": "httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "product_id": "httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.51-7.el9_0.7?arch=noarch" } } }, { "category": "product_version", "name": "httpd-manual-0:2.4.51-7.el9_0.7.noarch", "product": { "name": "httpd-manual-0:2.4.51-7.el9_0.7.noarch", "product_id": "httpd-manual-0:2.4.51-7.el9_0.7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.51-7.el9_0.7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "httpd-0:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "httpd-0:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x" }, "product_reference": "httpd-0:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.51-7.el9_0.7.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src" }, "product_reference": "httpd-0:2.4.51-7.el9_0.7.src", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "httpd-0:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x" }, "product_reference": "httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x" }, "product_reference": "httpd-devel-0:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.51-7.el9_0.7.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch" }, "product_reference": "httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.51-7.el9_0.7.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch" }, "product_reference": "httpd-manual-0:2.4.51-7.el9_0.7.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x" }, "product_reference": "httpd-tools-0:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x" }, "product_reference": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x" }, "product_reference": "mod_ldap-0:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x" }, "product_reference": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "mod_lua-0:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x" }, "product_reference": "mod_lua-0:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "mod_lua-0:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x" }, "product_reference": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x" }, "product_reference": "mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "mod_session-0:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "mod_session-0:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x" }, "product_reference": "mod_session-0:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "mod_session-0:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x" }, "product_reference": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x" }, "product_reference": "mod_ssl-1:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le" }, "product_reference": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x" }, "product_reference": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:49+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295013" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Due to a substitution encoding issue, specially crafted requests may allow an attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant only to be executed as CGI.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Substitution encoding issue in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive. Also, to exploit this flaw, an attacker must be able to upload files to the server. For these reasons, this flaw was rated with an important and not critical severity.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38474" }, { "category": "external", "summary": "RHBZ#2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38474", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-25T08:34:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4863" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Substitution encoding issue in mod_rewrite" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:22:02+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295014" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Improper escaping of output allows an attacker to map URLs to filesystem locations permitted to be served by the server but are not intentionally or directly reachable by any URL. This issue results in code execution or source code disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Improper escaping of output in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations with substitution rules used in the RewriteRule directive using backreferences or variables as the first segment of the substitution.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38475" }, { "category": "external", "summary": "RHBZ#2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38475", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-25T08:34:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4863" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Improper escaping of output in mod_rewrite" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-07-01T19:22:29+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295016" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. A NULL pointer dereference can be triggered when processing a specially crafted HTTP request, causing the httpd server to crash, and resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "As this flaw allows a remote attacker to cause a denial of service, it has been rated with an important severity.\n\nThis flaw only affects configurations with mod_proxy loaded and being used. This module can be disabled via the configuration file if its functionality is not being used.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38477" }, { "category": "external", "summary": "RHBZ#2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-25T08:34:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4863" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.src", "AppStream-9.0.0.Z.E4S:httpd-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-debugsource-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-devel-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-filesystem-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-manual-0:2.4.51-7.el9_0.7.noarch", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:httpd-tools-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ldap-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_lua-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_proxy_html-debuginfo-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_session-debuginfo-0:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-1:2.4.51-7.el9_0.7.x86_64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.aarch64", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.ppc64le", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.s390x", "AppStream-9.0.0.Z.E4S:mod_ssl-debuginfo-1:2.4.51-7.el9_0.7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: NULL pointer dereference in mod_proxy" } ] }
rhsa-2024_4827
Vulnerability from csaf_redhat
Published
2024-07-24 13:18
Modified
2024-11-24 17:33
Summary
Red Hat Security Advisory: httpd:2.4 security update
Notes
Topic
An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)
* httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)
* httpd: NULL pointer dereference in mod_proxy (CVE-2024-38477)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)\n\n* httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)\n\n* httpd: NULL pointer dereference in mod_proxy (CVE-2024-38477)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4827", "url": "https://access.redhat.com/errata/RHSA-2024:4827" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4827.json" } ], "title": "Red Hat Security Advisory: httpd:2.4 security update", "tracking": { "current_release_date": "2024-11-24T17:33:13+00:00", "generator": { "date": "2024-11-24T17:33:13+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:4827", "initial_release_date": "2024-07-24T13:18:31+00:00", "revision_history": [ { "date": "2024-07-24T13:18:31+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-07-24T13:18:31+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T17:33:13+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product": { "name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_aus:8.6::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:8.6::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product": { "name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_tus:8.6::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd:2.4:8060020240719220036:ad008a3a", "product": { "name": "httpd:2.4:8060020240719220036:ad008a3a", "product_id": "httpd:2.4:8060020240719220036:ad008a3a", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/httpd@2.4:8060020240719220036:ad008a3a" } } }, { "category": "product_version", "name": "httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "product": { "name": "httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "product_id": "httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=noarch" } } }, { "category": "product_version", "name": "httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "product": { "name": "httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "product_id": "httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "product": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "product_id": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=src" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "product": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "product_id": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=src" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "product": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "product_id": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "product": { "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "product_id": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "product": { "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "product_id": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_id": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "product": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "product_id": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "product": { "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "product_id": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "product": { "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "product_id": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_id": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "product": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "product_id": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "product": { "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "product_id": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "product": { "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "product_id": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_id": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "product": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "product_id": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "product": { "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "product_id": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "product": { "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "product_id": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-5.module%2Bel8.6.0%2B21746%2Bf601aac0.3?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_id": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-47.module%2Bel8.6.0%2B22124%2B21ed7001.9?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, "product_reference": "httpd:2.4:8060020240719220036:ad008a3a", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src" }, "product_reference": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch" }, "product_reference": "httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src" }, "product_reference": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64" }, "product_reference": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, "product_reference": "httpd:2.4:8060020240719220036:ad008a3a", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src" }, "product_reference": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch" }, "product_reference": "httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64" }, "product_reference": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le" }, "product_reference": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x" }, "product_reference": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src" }, "product_reference": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64" }, "product_reference": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le" }, "product_reference": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x" }, "product_reference": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, "product_reference": "httpd:2.4:8060020240719220036:ad008a3a", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src" }, "product_reference": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch" }, "product_reference": "httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src" }, "product_reference": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64" }, "product_reference": "mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64 as a component of httpd:2.4:8060020240719220036:ad008a3a as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:49+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295013" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Due to a substitution encoding issue, specially crafted requests may allow an attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant only to be executed as CGI.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Substitution encoding issue in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive. Also, to exploit this flaw, an attacker must be able to upload files to the server. For these reasons, this flaw was rated with an important and not critical severity.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38474" }, { "category": "external", "summary": "RHBZ#2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38474", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-24T13:18:31+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4827" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Substitution encoding issue in mod_rewrite" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:22:02+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295014" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Improper escaping of output allows an attacker to map URLs to filesystem locations permitted to be served by the server but are not intentionally or directly reachable by any URL. This issue results in code execution or source code disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Improper escaping of output in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations with substitution rules used in the RewriteRule directive using backreferences or variables as the first segment of the substitution.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38475" }, { "category": "external", "summary": "RHBZ#2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38475", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-24T13:18:31+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4827" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Improper escaping of output in mod_rewrite" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-07-01T19:22:29+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295016" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. A NULL pointer dereference can be triggered when processing a specially crafted HTTP request, causing the httpd server to crash, and resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "As this flaw allows a remote attacker to cause a denial of service, it has been rated with an important severity.\n\nThis flaw only affects configurations with mod_proxy loaded and being used. This module can be disabled via the configuration file if its functionality is not being used.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38477" }, { "category": "external", "summary": "RHBZ#2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-24T13:18:31+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4827" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.AUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.aarch64", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.ppc64le", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.s390x", "AppStream-8.6.0.Z.E4S:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-debugsource-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-devel-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-filesystem-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-manual-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.noarch", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:httpd-tools-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+21746+f601aac0.3.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ldap-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_proxy_html-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_session-debuginfo-0:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64", "AppStream-8.6.0.Z.TUS:httpd:2.4:8060020240719220036:ad008a3a:mod_ssl-debuginfo-1:2.4.37-47.module+el8.6.0+22124+21ed7001.9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: NULL pointer dereference in mod_proxy" } ] }
rhsa-2024_4938
Vulnerability from csaf_redhat
Published
2024-07-31 10:23
Modified
2024-11-24 17:34
Summary
Red Hat Security Advisory: httpd security update
Notes
Topic
An update for httpd is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)
* httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)
* httpd: NULL pointer dereference in mod_proxy (CVE-2024-38477)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for httpd is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)\n\n* httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)\n\n* httpd: NULL pointer dereference in mod_proxy (CVE-2024-38477)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4938", "url": "https://access.redhat.com/errata/RHSA-2024:4938" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4938.json" } ], "title": "Red Hat Security Advisory: httpd security update", "tracking": { "current_release_date": "2024-11-24T17:34:01+00:00", "generator": { "date": "2024-11-24T17:34:01+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:4938", "initial_release_date": "2024-07-31T10:23:15+00:00", "revision_history": [ { "date": "2024-07-31T10:23:15+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-07-31T10:23:15+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T17:34:01+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.7::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-90.el7_7.4.src", "product": { "name": "httpd-0:2.4.6-90.el7_7.4.src", "product_id": "httpd-0:2.4.6-90.el7_7.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-90.el7_7.4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-90.el7_7.4.x86_64", "product": { "name": "httpd-0:2.4.6-90.el7_7.4.x86_64", "product_id": "httpd-0:2.4.6-90.el7_7.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-90.el7_7.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "product": { "name": "httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "product_id": "httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-90.el7_7.4?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "product": { "name": "httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "product_id": "httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-90.el7_7.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-90.el7_7.4.x86_64", "product": { "name": "mod_session-0:2.4.6-90.el7_7.4.x86_64", "product_id": "mod_session-0:2.4.6-90.el7_7.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-90.el7_7.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "product": { "name": "mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "product_id": "mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-90.el7_7.4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "product_id": "httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-90.el7_7.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "product": { "name": "mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "product_id": "mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-90.el7_7.4?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "product": { "name": "mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "product_id": "mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-90.el7_7.4?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-manual-0:2.4.6-90.el7_7.4.noarch", "product": { "name": "httpd-manual-0:2.4.6-90.el7_7.4.noarch", "product_id": "httpd-manual-0:2.4.6-90.el7_7.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-90.el7_7.4?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.4.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src" }, "product_reference": "httpd-0:2.4.6-90.el7_7.4.src", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "httpd-0:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-90.el7_7.4.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch" }, "product_reference": "httpd-manual-0:2.4.6-90.el7_7.4.noarch", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "mod_session-0:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.4.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src" }, "product_reference": "httpd-0:2.4.6-90.el7_7.4.src", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "httpd-0:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-90.el7_7.4.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch" }, "product_reference": "httpd-manual-0:2.4.6-90.el7_7.4.noarch", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "mod_session-0:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-90.el7_7.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:49+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295013" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Due to a substitution encoding issue, specially crafted requests may allow an attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant only to be executed as CGI.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Substitution encoding issue in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive. Also, to exploit this flaw, an attacker must be able to upload files to the server. For these reasons, this flaw was rated with an important and not critical severity.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38474" }, { "category": "external", "summary": "RHBZ#2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38474", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-31T10:23:15+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4938" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Substitution encoding issue in mod_rewrite" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:22:02+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295014" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Improper escaping of output allows an attacker to map URLs to filesystem locations permitted to be served by the server but are not intentionally or directly reachable by any URL. This issue results in code execution or source code disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Improper escaping of output in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations with substitution rules used in the RewriteRule directive using backreferences or variables as the first segment of the substitution.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38475" }, { "category": "external", "summary": "RHBZ#2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38475", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-31T10:23:15+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4938" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Improper escaping of output in mod_rewrite" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-07-01T19:22:29+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295016" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. A NULL pointer dereference can be triggered when processing a specially crafted HTTP request, causing the httpd server to crash, and resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "As this flaw allows a remote attacker to cause a denial of service, it has been rated with an important severity.\n\nThis flaw only affects configurations with mod_proxy loaded and being used. This module can be disabled via the configuration file if its functionality is not being used.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38477" }, { "category": "external", "summary": "RHBZ#2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-31T10:23:15+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4938" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.src", "7Server-optional-7.7.AUS:httpd-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-debuginfo-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-devel-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:httpd-manual-0:2.4.6-90.el7_7.4.noarch", "7Server-optional-7.7.AUS:httpd-tools-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ldap-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_proxy_html-1:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_session-0:2.4.6-90.el7_7.4.x86_64", "7Server-optional-7.7.AUS:mod_ssl-1:2.4.6-90.el7_7.4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: NULL pointer dereference in mod_proxy" } ] }
rhsa-2024_5239
Vulnerability from csaf_redhat
Published
2024-08-13 13:18
Modified
2024-12-01 21:40
Summary
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.57 SP5 security update
Notes
Topic
Red Hat JBoss Core Services Apache HTTP Server 2.4.57 Service Pack 5 is now available.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products and packaged under Red Hat JBoss Core Services, to allow for faster distribution of updates and for a more consistent update experience.
This release of Red Hat JBoss Core Services Apache HTTP Server 2.4.57 Service Pack 5 serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.57 Service Pack 4, and includes bug fixes and enhancements, which are documented in the Release Notes linked to in the References section.
Security Fix(es):
* jbcs-httpd24-httpd: Potential SSRF in mod_rewrite (CVE-2024-39573)
* jbcs-httpd24-httpd: null pointer dereference in mod_proxy (CVE-2024-38477)
* jbcs-httpd24-httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)
* jbcs-httpd24-httpd: Encoding problem in mod_proxy (CVE-2024-38473)
* jbcs-httpd24-httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)
* jbcs-httpd24-httpd: Security issues via backend applications whose response headers are malicious or exploitable (CVE-2024-38476)
A Red Hat Security Bulletin which addresses further details about this flaw is available in the References section.
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss Core Services Apache HTTP Server 2.4.57 Service Pack 5 is now available.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products and packaged under Red Hat JBoss Core Services, to allow for faster distribution of updates and for a more consistent update experience.\n\nThis release of Red Hat JBoss Core Services Apache HTTP Server 2.4.57 Service Pack 5 serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.57 Service Pack 4, and includes bug fixes and enhancements, which are documented in the Release Notes linked to in the References section.\n\nSecurity Fix(es):\n\n* jbcs-httpd24-httpd: Potential SSRF in mod_rewrite (CVE-2024-39573)\n* jbcs-httpd24-httpd: null pointer dereference in mod_proxy (CVE-2024-38477)\n* jbcs-httpd24-httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)\n* jbcs-httpd24-httpd: Encoding problem in mod_proxy (CVE-2024-38473)\n* jbcs-httpd24-httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)\n* jbcs-httpd24-httpd: Security issues via backend applications whose response headers are malicious or exploitable (CVE-2024-38476)\n\nA Red Hat Security Bulletin which addresses further details about this flaw is available in the References section.\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:5239", "url": "https://access.redhat.com/errata/RHSA-2024:5239" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_core_services/2.4.57/html/red_hat_jboss_core_services_apache_http_server_2.4.57_service_pack_5_release_notes/index", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_core_services/2.4.57/html/red_hat_jboss_core_services_apache_http_server_2.4.57_service_pack_5_release_notes/index" }, { "category": "external", "summary": "2295012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295012" }, { "category": "external", "summary": "2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "2295015", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295015" }, { "category": "external", "summary": "2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "2295022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295022" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_5239.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.57 SP5 security update", "tracking": { "current_release_date": "2024-12-01T21:40:28+00:00", "generator": { "date": "2024-12-01T21:40:28+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:5239", "initial_release_date": "2024-08-13T13:18:01+00:00", "revision_history": [ { "date": "2024-08-13T13:18:01+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-08-13T13:18:01+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-01T21:40:28+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Core Services on RHEL 7 Server", "product": { "name": "Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1::el7" } } }, { "category": "product_name", "name": "Red Hat JBoss Core Services on RHEL 8", "product": { "name": "Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1::el8" } } } ], "category": "product_family", "name": "Red Hat JBoss Core Services" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "product": { "name": "jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "product_id": "jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.57-13.el7jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "product": { "name": "jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "product_id": "jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.19-41.el7jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "product": { "name": "jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "product_id": "jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk@1.2.49-11.redhat_1.el7jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "product": { "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "product_id": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_cluster@1.3.20-8.el7jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "product_id": "jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.3-40.el7jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "product": { "name": "jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "product_id": "jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.4.24-11.el7jbcs?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "product": { "name": "jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "product_id": "jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.57-13.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "product": { "name": "jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "product_id": "jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.19-41.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "product": { "name": "jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "product_id": "jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk@1.2.49-11.redhat_1.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "product": { "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "product_id": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_cluster@1.3.20-8.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "product_id": "jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.3-40.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "product": { "name": "jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "product_id": "jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.4.24-11.el8jbcs?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.57-13.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.57-13.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.57-13.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.57-13.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.57-13.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.57-13.el7jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.57-13.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.57-13.el7jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.57-13.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.19-41.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2-debuginfo@1.15.19-41.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24@1.2.49-11.redhat_1.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-debuginfo@1.2.49-11.redhat_1.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_cluster@1.3.20-8.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_cluster-debuginfo@1.3.20-8.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.3-40.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.3-40.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.4.24-11.el7jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md-debuginfo@2.4.24-11.el7jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.57-13.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.57-13.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.57-13.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.57-13.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.57-13.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.57-13.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.57-13.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.57-13.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.57-13.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools-debuginfo@2.4.57-13.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap-debuginfo@2.4.57-13.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html-debuginfo@2.4.57-13.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session-debuginfo@2.4.57-13.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl-debuginfo@2.4.57-13.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.19-41.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2-debuginfo@1.15.19-41.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24@1.2.49-11.redhat_1.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24-debuginfo@1.2.49-11.redhat_1.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_cluster@1.3.20-8.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_cluster-debuginfo@1.3.20-8.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.3-40.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.3-40.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.4.24-11.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md-debuginfo@2.4.24-11.el8jbcs?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "product": { "name": "jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "product_id": "jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.57-13.el7jbcs?arch=noarch" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "product": { "name": "jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "product_id": "jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.57-13.el8jbcs?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch" }, "product_reference": "jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src" }, "product_reference": "jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src" }, "product_reference": "jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src" }, "product_reference": "jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src" }, "product_reference": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch" }, "product_reference": "jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src" }, "product_reference": "jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src" }, "product_reference": "jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src" }, "product_reference": "jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src" }, "product_reference": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38473", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:36+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295012" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. Due to an encoding problem, specially crafted request URLs with incorrect encoding can be sent to backend services, potentially bypassing authentication.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Encoding problem in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations where mechanisms other than ProxyPass/ProxyPassMatch or RewriteRule with the \u0027P\u0027 flag are used to configure a request to be proxied, such as SetHandler or inadvertent proxying via CVE-2024-39573. Note that these alternate mechanisms may be used within .htaccess files.\n\nFor more information about CVE-2024-39573, see https://access.redhat.com/security/cve/CVE-2024-39573.\n\nAdditionally, this flaw requires mod_proxy to be loaded and being used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38473" }, { "category": "external", "summary": "RHBZ#2295012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295012" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38473", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38473" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38473", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38473" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38473", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38473" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T13:18:01+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5239" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: Encoding problem in mod_proxy" }, { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:49+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295013" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Due to a substitution encoding issue, specially crafted requests may allow an attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant only to be executed as CGI.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Substitution encoding issue in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive. Also, to exploit this flaw, an attacker must be able to upload files to the server. For these reasons, this flaw was rated with an important and not critical severity.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38474" }, { "category": "external", "summary": "RHBZ#2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38474", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T13:18:01+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5239" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Substitution encoding issue in mod_rewrite" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:22:02+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295014" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Improper escaping of output allows an attacker to map URLs to filesystem locations permitted to be served by the server but are not intentionally or directly reachable by any URL. This issue results in code execution or source code disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Improper escaping of output in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations with substitution rules used in the RewriteRule directive using backreferences or variables as the first segment of the substitution.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38475" }, { "category": "external", "summary": "RHBZ#2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38475", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T13:18:01+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5239" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Improper escaping of output in mod_rewrite" }, { "cve": "CVE-2024-38476", "cwe": { "id": "CWE-829", "name": "Inclusion of Functionality from Untrusted Control Sphere" }, "discovery_date": "2024-07-01T19:22:16+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295015" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd. Backend applications whose response headers are malicious or exploitable may allow information disclosure, server-side request forgery (SSRF) or local script execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Security issues via\u00a0backend applications whose response headers are malicious or exploitable", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw can only be exploited by backend applications via malicious or exploitable response headers. For this reason, this flaw was rated with an important and not critical severity.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38476" }, { "category": "external", "summary": "RHBZ#2295015", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295015" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38476", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38476" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38476", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38476" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T13:18:01+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5239" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Security issues via\u00a0backend applications whose response headers are malicious or exploitable" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-07-01T19:22:29+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295016" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. A NULL pointer dereference can be triggered when processing a specially crafted HTTP request, causing the httpd server to crash, and resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "As this flaw allows a remote attacker to cause a denial of service, it has been rated with an important severity.\n\nThis flaw only affects configurations with mod_proxy loaded and being used. This module can be disabled via the configuration file if its functionality is not being used.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38477" }, { "category": "external", "summary": "RHBZ#2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T13:18:01+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5239" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: NULL pointer dereference in mod_proxy" }, { "cve": "CVE-2024-39573", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-07-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295022" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. A potential SSRF allows an attacker to cause unsafe rules used in the RewriteRule directive to unexpectedly set up URLs to be handled by the mod_proxy module.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Potential SSRF in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive.\n\nAdditionally, this flaw requires mod_rewrite and mod_proxy to be loaded and being used. These modules can be disabled via the configuration file if their functionality are not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-39573" }, { "category": "external", "summary": "RHBZ#2295022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295022" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-39573", "url": "https://www.cve.org/CVERecord?id=CVE-2024-39573" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-39573", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39573" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-39573", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-39573" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T13:18:01+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5239" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.49-11.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.57-13.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-41.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.49-11.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.49-11.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.24-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.20-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.57-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.57-13.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: Potential SSRF in mod_rewrite" } ] }
rhsa-2024_4719
Vulnerability from csaf_redhat
Published
2024-07-23 08:59
Modified
2024-11-24 17:33
Summary
Red Hat Security Advisory: httpd:2.4 security update
Notes
Topic
An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)
* httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)
* httpd: NULL pointer dereference in mod_proxy (CVE-2024-38477)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: Substitution encoding issue in mod_rewrite (CVE-2024-38474)\n\n* httpd: Improper escaping of output in mod_rewrite (CVE-2024-38475)\n\n* httpd: NULL pointer dereference in mod_proxy (CVE-2024-38477)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4719", "url": "https://access.redhat.com/errata/RHSA-2024:4719" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4719.json" } ], "title": "Red Hat Security Advisory: httpd:2.4 security update", "tracking": { "current_release_date": "2024-11-24T17:33:03+00:00", "generator": { "date": "2024-11-24T17:33:03+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:4719", "initial_release_date": "2024-07-23T08:59:27+00:00", "revision_history": [ { "date": "2024-07-23T08:59:27+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-07-23T08:59:27+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T17:33:03+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd:2.4:8080020240717184413:63b34585", "product": { "name": "httpd:2.4:8080020240717184413:63b34585", "product_id": "httpd:2.4:8080020240717184413:63b34585", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/httpd@2.4:8080020240717184413:63b34585" } } }, { "category": "product_version", "name": "httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "product": { "name": "httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "product_id": "httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=noarch" } } }, { "category": "product_version", "name": "httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "product": { "name": "httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "product_id": "httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "product": { "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "product_id": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=src" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "product": { "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "product_id": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=src" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "product": { "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "product_id": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "product": { "name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "product_id": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "product": { "name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "product_id": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_id": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "product": { "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "product_id": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "product": { "name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "product_id": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "product": { "name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "product_id": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_id": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "product": { "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "product_id": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "product": { "name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "product_id": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "product": { "name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "product_id": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_id": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "product": { "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "product_id": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "product": { "name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "product_id": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "product": { "name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "product_id": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-8.module%2Bel8.8.0%2B21773%2B20528f83.5?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_id": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-56.module%2Bel8.8.0%2B22079%2Be03f6970.8?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, "product_reference": "httpd:2.4:8080020240717184413:63b34585", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src" }, "product_reference": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch" }, "product_reference": "httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64" }, "product_reference": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le" }, "product_reference": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x" }, "product_reference": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src" }, "product_reference": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64" }, "product_reference": "mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le" }, "product_reference": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x" }, "product_reference": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64 as a component of httpd:2.4:8080020240717184413:63b34585 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:21:49+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295013" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Due to a substitution encoding issue, specially crafted requests may allow an attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant only to be executed as CGI.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Substitution encoding issue in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects configurations with unsafe rules used in the RewriteRule directive. Also, to exploit this flaw, an attacker must be able to upload files to the server. For these reasons, this flaw was rated with an important and not critical severity.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38474" }, { "category": "external", "summary": "RHBZ#2295013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38474", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38474" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38474" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T08:59:27+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4719" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Substitution encoding issue in mod_rewrite" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "discovery_date": "2024-07-01T19:22:02+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295014" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_rewrite module of httpd. Improper escaping of output allows an attacker to map URLs to filesystem locations permitted to be served by the server but are not intentionally or directly reachable by any URL. This issue results in code execution or source code disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Improper escaping of output in mod_rewrite", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects configurations with substitution rules used in the RewriteRule directive using backreferences or variables as the first segment of the substitution.\n\nAdditionally, this flaw requires mod_rewrite to be loaded and used. This module can be disabled if its functionality is not needed.\n\nRed Hat Enterprise Linux 6 is not affected by this vulnerability because the vulnerable code was introduced in a newer version of httpd.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38475" }, { "category": "external", "summary": "RHBZ#2295014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38475", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38475" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T08:59:27+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4719" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: Improper escaping of output in mod_rewrite" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-07-01T19:22:29+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2295016" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. A NULL pointer dereference can be triggered when processing a specially crafted HTTP request, causing the httpd server to crash, and resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference in mod_proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "As this flaw allows a remote attacker to cause a denial of service, it has been rated with an important severity.\n\nThis flaw only affects configurations with mod_proxy loaded and being used. This module can be disabled via the configuration file if its functionality is not being used.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-38477" }, { "category": "external", "summary": "RHBZ#2295016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-38477", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-38477" } ], "release_date": "2024-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-23T08:59:27+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4719" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-debugsource-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-devel-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-filesystem-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-manual-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.noarch", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:httpd-tools-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debuginfo-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_http2-debugsource-0:1.15.7-8.module+el8.8.0+21773+20528f83.5.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ldap-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_proxy_html-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_session-debuginfo-0:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.aarch64", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.ppc64le", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.s390x", "AppStream-8.8.0.Z.EUS:httpd:2.4:8080020240717184413:63b34585:mod_ssl-debuginfo-1:2.4.37-56.module+el8.8.0+22079+e03f6970.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: NULL pointer dereference in mod_proxy" } ] }
wid-sec-w-2024-1504
Vulnerability from csaf_certbund
Published
2024-07-01 22:00
Modified
2024-12-04 23:00
Summary
Apache HTTP Server: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Apache ist ein Webserver für verschiedene Plattformen.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Apache HTTP Server ausnutzen, um beliebigen Code auszuführen, einen Denial-of-Service-Zustand herbeizuführen, Sicherheitsmaßnahmen zu umgehen oder vertrauliche Informationen offenzulegen.
Betroffene Betriebssysteme
- Linux
- MacOS X
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Apache ist ein Webserver f\u00fcr verschiedene Plattformen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Apache HTTP Server ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder vertrauliche Informationen offenzulegen.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1504 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1504.json" }, { "category": "self", "summary": "WID-SEC-2024-1504 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1504" }, { "category": "external", "summary": "Apache Advisory vom 2024-07-01", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" }, { "category": "external", "summary": "Red Hat Bugzilla vom 2024-07-01", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295006" }, { "category": "external", "summary": "Red Hat Bugzilla vom 2024-07-01", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295012" }, { "category": "external", "summary": "Red Hat Bugzilla vom 2024-07-01", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295013" }, { "category": "external", "summary": "Red Hat Bugzilla vom 2024-07-01", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295014" }, { "category": "external", "summary": "Red Hat Bugzilla vom 2024-07-01", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295016" }, { "category": "external", "summary": "Red Hat Bugzilla vom 2024-07-01", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295018" }, { "category": "external", "summary": "Red Hat Bugzilla vom 2024-07-01", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295022" }, { "category": "external", "summary": "Apache HTTP Server", "url": "https://seclists.org/oss-sec/2024/q3/8" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:4197 vom 2024-07-02", "url": "https://errata.build.resf.org/RLSA-2024:4197" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-39F1A828ED vom 2024-07-03", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-39f1a828ed" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-E7E73BEFAD vom 2024-07-03", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-e7e73befad" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6885-1 vom 2024-07-08", "url": "https://ubuntu.com/security/notices/USN-6885-1" }, { "category": "external", "summary": "IBM Security Bulletin 7159849 vom 2024-07-09", "url": "https://www.ibm.com/support/pages/node/7159849" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-661BB6322D vom 2024-07-11", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-661bb6322d" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-CB8ACBF644 vom 2024-07-11", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-cb8acbf644" }, { "category": "external", "summary": "IBM Security Bulletin 7160019 vom 2024-07-11", "url": "https://www.ibm.com/support/pages/node/7160019" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2405-1 vom 2024-07-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018934.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5729 vom 2024-07-12", "url": "https://lists.debian.org/debian-security-announce/2024/msg00140.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6885-2 vom 2024-07-11", "url": "https://ubuntu.com/security/notices/USN-6885-2" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2560-1 vom 2024-07-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/019002.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-2594 vom 2024-07-23", "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2594.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2591-1 vom 2024-07-22", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/019006.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2597-1 vom 2024-07-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/019023.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-4726 vom 2024-07-24", "url": "https://linux.oracle.com/errata/ELSA-2024-4726.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4719 vom 2024-07-23", "url": "https://access.redhat.com/errata/RHSA-2024:4719" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4720 vom 2024-07-23", "url": "https://access.redhat.com/errata/RHSA-2024:4720" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4726 vom 2024-07-23", "url": "https://access.redhat.com/errata/RHSA-2024:4726" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-4720 vom 2024-07-24", "url": "https://linux.oracle.com/errata/ELSA-2024-4720.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-1944 vom 2024-07-24", "url": "https://alas.aws.amazon.com/ALAS-2024-1944.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4827 vom 2024-07-24", "url": "https://access.redhat.com/errata/RHSA-2024:4827" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4830 vom 2024-07-24", "url": "https://access.redhat.com/errata/RHSA-2024:4830" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4820 vom 2024-07-24", "url": "https://access.redhat.com/errata/RHSA-2024:4820" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4862 vom 2024-07-25", "url": "https://access.redhat.com/errata/RHSA-2024:4862" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4863 vom 2024-07-25", "url": "https://access.redhat.com/errata/RHSA-2024:4863" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:4726 vom 2024-07-26", "url": "https://errata.build.resf.org/RLSA-2024:4726" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2624-1 vom 2024-07-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/019050.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4938 vom 2024-07-31", "url": "https://access.redhat.com/errata/RHSA-2024:4938" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4943 vom 2024-07-31", "url": "https://access.redhat.com/errata/RHSA-2024:4943" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-E83AF0855E vom 2024-08-01", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-e83af0855e" }, { "category": "external", "summary": "F5 Security Advisory K000140505 vom 2024-08-03", "url": "https://my.f5.com/manage/s/article/K000140505" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5001 vom 2024-08-05", "url": "https://access.redhat.com/errata/RHSA-2024:5001" }, { "category": "external", "summary": "F5 Security Advisory K000140620 vom 2024-08-08", "url": "https://my.f5.com/manage/s/article/K000140620" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5138 vom 2024-08-08", "url": "https://access.redhat.com/errata/RHSA-2024:5138" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-5138 vom 2024-08-09", "url": "https://linux.oracle.com/errata/ELSA-2024-5138.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5193 vom 2024-08-12", "url": "https://access.redhat.com/errata/RHSA-2024:5193" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5239 vom 2024-08-13", "url": "https://access.redhat.com/errata/RHSA-2024:5239" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5240 vom 2024-08-13", "url": "https://access.redhat.com/errata/RHSA-2024:5240" }, { "category": "external", "summary": "F5 Security Advisory K000140693 vom 2024-08-13", "url": "https://my.f5.com/manage/s/article/K000140693" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-5193 vom 2024-08-14", "url": "https://linux.oracle.com/errata/ELSA-2024-5193.html" }, { "category": "external", "summary": "IBM Security Bulletin 7165827 vom 2024-08-19", "url": "https://www.ibm.com/support/pages/node/7165827" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2436-1 vom 2024-08-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019226.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2997-1 vom 2024-08-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019299.html" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:5138 vom 2024-08-21", "url": "https://errata.build.resf.org/RLSA-2024:5138" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:5193 vom 2024-08-21", "url": "https://errata.build.resf.org/RLSA-2024:5193" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2999-1 vom 2024-08-22", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019301.html" }, { "category": "external", "summary": "F5 Security Advisory K000140784 vom 2024-08-23", "url": "https://my.f5.com/manage/s/article/K000140784" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5812 vom 2024-08-26", "url": "https://access.redhat.com/errata/RHSA-2024:5812" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:5832 vom 2024-08-26", "url": "https://access.redhat.com/errata/RHSA-2024:5832" }, { "category": "external", "summary": "DELL Security Update for Dell PowerScale OneFS", "url": "https://www.dell.com/support/kbdoc/en-us/000228207/dsa-2024-346-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6136 vom 2024-09-03", "url": "https://access.redhat.com/errata/RHSA-2024:6136" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6004 vom 2024-09-04", "url": "https://access.redhat.com/errata/RHSA-2024:6004" }, { "category": "external", "summary": "IBM Security Bulletin 7166853 vom 2024-09-05", "url": "https://www.ibm.com/support/pages/node/7166853" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6013 vom 2024-09-05", "url": "https://access.redhat.com/errata/RHSA-2024:6013" }, { "category": "external", "summary": "IBM Security Bulletin 7167662 vom 2024-09-05", "url": "https://www.ibm.com/support/pages/node/7167662" }, { "category": "external", "summary": "XEROX Security Advisory XRX24-013 vom 2024-09-05", "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2024/09/Xerox-Security-Bulletin-XRX24-013-for-Xerox-FreeFlow-Print-Server-v2-_Windows10.pdf" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6468 vom 2024-09-09", "url": "https://access.redhat.com/errata/RHSA-2024:6468" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6467 vom 2024-09-09", "url": "https://access.redhat.com/errata/RHSA-2024:6467" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3173-1 vom 2024-09-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019389.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3172-1 vom 2024-09-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019390.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6584 vom 2024-09-11", "url": "https://access.redhat.com/errata/RHSA-2024:6584" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6583 vom 2024-09-11", "url": "https://access.redhat.com/errata/RHSA-2024:6583" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-4943 vom 2024-09-14", "url": "https://linux.oracle.com/errata/ELSA-2024-4943.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6885-3 vom 2024-09-18", "url": "https://ubuntu.com/security/notices/USN-6885-3" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6928 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:6928" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6927 vom 2024-09-24", "url": "https://access.redhat.com/errata/RHSA-2024:6927" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7101 vom 2024-09-25", "url": "https://access.redhat.com/errata/RHSA-2024:7101" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202409-31 vom 2024-09-28", "url": "https://security.gentoo.org/glsa/202409-31" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-423 vom 2024-10-11", "url": "https://www.dell.com/support/kbdoc/de-de/000235068/dsa-2024-423-security-update-for-dell-networker-and-networker-management-console-nmc-multiple-component-vulnerabilities" }, { "category": "external", "summary": "IBM Security Bulletin 7173018 vom 2024-10-14", "url": "https://www.ibm.com/support/pages/node/7173018" }, { "category": "external", "summary": "Debian Security Advisory DLA-3921 vom 2024-10-17", "url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00013.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-7101 vom 2024-10-17", "url": "https://linux.oracle.com/errata/ELSA-2024-7101.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8680 vom 2024-10-31", "url": "https://access.redhat.com/errata/RHSA-2024:8680" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-8680 vom 2024-10-31", "url": "http://linux.oracle.com/errata/ELSA-2024-8680.html" }, { "category": "external", "summary": "HCL Security Advisory", "url": "https://support.hcl-software.com/csm?id=kb_article\u0026sysparm_article=KB0115052" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:8680 vom 2024-11-08", "url": "https://errata.build.resf.org/RLSA-2024:8680" }, { "category": "external", "summary": "XEROX Security Advisory XRX24-016 vom 2024-11-18", "url": "https://security.business.xerox.com/wp-content/uploads/2024/11/Xerox%C2%AE-Security-Bulletin-XRX24-016-for-Xerox%C2%AEFreeFlow%C2%AE-Print-Server-v9.pdf" }, { "category": "external", "summary": "XEROX Security Advisory XRX24-017 vom 2024-11-21", "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2024/11/Xerox-Security-Bulletin-XRX24-017-for-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v9.pdf" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-453 vom 2024-12-05", "url": "https://www.dell.com/support/kbdoc/de-de/000256645/dsa-2024-453-security-update-for-dell-powerscale-onefs-multiple-security-vulnerabilities" } ], "source_lang": "en-US", "title": "Apache HTTP Server: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-12-04T23:00:00.000+00:00", "generator": { "date": "2024-12-05T10:12:10.650+00:00", "engine": { "name": "BSI-WID", "version": "1.3.10" } }, "id": "WID-SEC-W-2024-1504", "initial_release_date": "2024-07-01T22:00:00.000+00:00", "revision_history": [ { "date": "2024-07-01T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-07-02T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen" }, { "date": "2024-07-03T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Fedora aufgenommen" }, { "date": "2024-07-08T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-07-09T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von IBM und IBM-APAR aufgenommen" }, { "date": "2024-07-11T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Fedora, IBM, SUSE, Debian und Ubuntu aufgenommen" }, { "date": "2024-07-18T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-07-22T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Amazon und SUSE aufgenommen" }, { "date": "2024-07-23T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen" }, { "date": "2024-07-24T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Amazon und Red Hat aufgenommen" }, { "date": "2024-07-25T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-07-28T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen" }, { "date": "2024-07-29T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-07-31T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-08-01T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Fedora aufgenommen" }, { "date": "2024-08-04T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von F5 aufgenommen" }, { "date": "2024-08-07T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von F5 aufgenommen" }, { "date": "2024-08-08T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-08-11T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen" }, { "date": "2024-08-13T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Red Hat und F5 aufgenommen" }, { "date": "2024-08-14T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-08-18T22:00:00.000+00:00", "number": "22", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-08-19T22:00:00.000+00:00", "number": "23", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-08-21T22:00:00.000+00:00", "number": "24", "summary": "Neue Updates von SUSE und Rocky Enterprise Software Foundation aufgenommen" }, { "date": "2024-08-22T22:00:00.000+00:00", "number": "25", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-08-25T22:00:00.000+00:00", "number": "26", "summary": "Neue Updates von F5 aufgenommen" }, { "date": "2024-09-01T22:00:00.000+00:00", "number": "27", "summary": "Neue Updates von Dell aufgenommen" }, { "date": "2024-09-02T22:00:00.000+00:00", "number": "28", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-03T22:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-05T22:00:00.000+00:00", "number": "30", "summary": "Neue Updates von IBM, Red Hat und XEROX aufgenommen" }, { "date": "2024-09-08T22:00:00.000+00:00", "number": "31", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-09T22:00:00.000+00:00", "number": "32", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-09-11T22:00:00.000+00:00", "number": "33", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-15T22:00:00.000+00:00", "number": "34", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-09-18T22:00:00.000+00:00", "number": "35", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-09-24T22:00:00.000+00:00", "number": "36", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-25T22:00:00.000+00:00", "number": "37", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-09-29T22:00:00.000+00:00", "number": "38", "summary": "Neue Updates von Gentoo aufgenommen" }, { "date": "2024-10-10T22:00:00.000+00:00", "number": "39", "summary": "Neue Updates von Dell aufgenommen" }, { "date": "2024-10-13T22:00:00.000+00:00", "number": "40", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-10-17T22:00:00.000+00:00", "number": "41", "summary": "Neue Updates von Debian und Oracle Linux aufgenommen" }, { "date": "2024-10-30T23:00:00.000+00:00", "number": "42", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-10-31T23:00:00.000+00:00", "number": "43", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-11-03T23:00:00.000+00:00", "number": "44", "summary": "Neue Updates von HCL aufgenommen" }, { "date": "2024-11-10T23:00:00.000+00:00", "number": "45", "summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen" }, { "date": "2024-11-18T23:00:00.000+00:00", "number": "46", "summary": "Neue Updates von XEROX aufgenommen" }, { "date": "2024-11-21T23:00:00.000+00:00", "number": "47", "summary": "Neue Updates von XEROX aufgenommen" }, { "date": "2024-12-04T23:00:00.000+00:00", "number": "48", "summary": "Neue Updates von Dell aufgenommen" } ], "status": "final", "version": "48" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c2.4.60", "product": { "name": "Apache HTTP Server \u003c2.4.60", "product_id": "T035727" } }, { "category": "product_version", "name": "2.4.60", "product": { "name": "Apache HTTP Server 2.4.60", "product_id": "T035727-fixed", "product_identification_helper": { "cpe": "cpe:/a:apache:http_server:2.4.60" } } } ], "category": "product_name", "name": "HTTP Server" } ], "category": "vendor", "name": "Apache" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c19.10.0.5", "product": { "name": "Dell NetWorker \u003c19.10.0.5", "product_id": "T038270" } }, { "category": "product_version", "name": "19.10.0.5", "product": { "name": "Dell NetWorker 19.10.0.5", "product_id": "T038270-fixed", "product_identification_helper": { "cpe": "cpe:/a:dell:networker:19.10.0.5" } } } ], "category": "product_name", "name": "NetWorker" }, { "branches": [ { "category": "product_name", "name": "Dell PowerScale", "product": { "name": "Dell PowerScale", "product_id": "T034610", "product_identification_helper": { "cpe": "cpe:/a:dell:powerscale_onefs:onefs" } } }, { "category": "product_version_range", "name": "OneFS \u003c9.8.0.1", "product": { "name": "Dell PowerScale OneFS \u003c9.8.0.1", "product_id": "T035762" } }, { "category": "product_version", "name": "OneFS 9.8.0.1", "product": { "name": "Dell PowerScale OneFS 9.8.0.1", "product_id": "T035762-fixed", "product_identification_helper": { "cpe": "cpe:/a:dell:powerscale_onefs:onefs__9.8.0.1" } } }, { "category": "product_version_range", "name": "OneFS \u003c9.4.0.20", "product": { "name": "Dell PowerScale OneFS \u003c9.4.0.20", "product_id": "T038705" } }, { "category": "product_version", "name": "OneFS 9.4.0.20", "product": { "name": "Dell PowerScale OneFS 9.4.0.20", "product_id": "T038705-fixed", "product_identification_helper": { "cpe": "cpe:/a:dell:powerscale_onefs:onefs__9.4.0.20" } } }, { "category": "product_version_range", "name": "OneFS \u003c9.5.1.1", "product": { "name": "Dell PowerScale OneFS \u003c9.5.1.1", "product_id": "T038706" } }, { "category": "product_version", "name": "OneFS 9.5.1.1", "product": { "name": "Dell PowerScale OneFS 9.5.1.1", "product_id": "T038706-fixed", "product_identification_helper": { "cpe": "cpe:/a:dell:powerscale_onefs:onefs__9.5.1.1" } } }, { "category": "product_version_range", "name": "OneFS \u003c9.7.1.3", "product": { "name": "Dell PowerScale OneFS \u003c9.7.1.3", "product_id": "T039585" } }, { "category": "product_version", "name": "OneFS 9.7.1.3", "product": { "name": "Dell PowerScale OneFS 9.7.1.3", "product_id": "T039585-fixed", "product_identification_helper": { "cpe": "cpe:/a:dell:powerscale_onefs:onefs__9.7.1.3" } } }, { "category": "product_version_range", "name": "OneFS \u003c9.9.0.1", "product": { "name": "Dell PowerScale OneFS \u003c9.9.0.1", "product_id": "T039586" } }, { "category": "product_version", "name": "OneFS 9.9.0.1", "product": { "name": "Dell PowerScale OneFS 9.9.0.1", "product_id": "T039586-fixed", "product_identification_helper": { "cpe": "cpe:/a:dell:powerscale_onefs:onefs__9.9.0.1" } } } ], "category": "product_name", "name": "PowerScale" } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "F5 BIG-IP", "product": { "name": "F5 BIG-IP", "product_id": "T001663", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:-" } } }, { "category": "product_version", "name": "17.1.0-17.1.1", "product": { "name": "F5 BIG-IP 17.1.0-17.1.1", "product_id": "T034899", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:17.1.0_-_17.1.1" } } }, { "category": "product_version", "name": "15.1.0-15.1.10", "product": { "name": "F5 BIG-IP 15.1.0-15.1.10", "product_id": "T034902", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:15.1.0_-_15.1.10" } } }, { "category": "product_version", "name": "16.1.0-16.1.5", "product": { "name": "F5 BIG-IP 16.1.0-16.1.5", "product_id": "T037028", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:16.1.0_-_16.1.5" } } } ], "category": "product_name", "name": "BIG-IP" } ], "category": "vendor", "name": "F5" }, { "branches": [ { "category": "product_name", "name": "Fedora Linux", "product": { "name": "Fedora Linux", "product_id": "74185", "product_identification_helper": { "cpe": "cpe:/o:fedoraproject:fedora:-" } } } ], "category": "vendor", "name": "Fedora" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "8.x", "product": { "name": "HCL Commerce 8.x", "product_id": "T038745", "product_identification_helper": { "cpe": "cpe:/a:hcltechsw:commerce:8.x" } } }, { "category": "product_version", "name": "9.0-9.0.1.21", "product": { "name": "HCL Commerce 9.0-9.0.1.21", "product_id": "T038746", "product_identification_helper": { "cpe": "cpe:/a:hcltechsw:commerce:9.0_-_9.0.1.21" } } }, { "category": "product_version", "name": "9.1.0-9.1.15", "product": { "name": "HCL Commerce 9.1.0-9.1.15", "product_id": "T038747", "product_identification_helper": { "cpe": "cpe:/a:hcltechsw:commerce:9.1.0_-_9.1.15" } } } ], "category": "product_name", "name": "Commerce" } ], "category": "vendor", "name": "HCL" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM Business Automation Workflow", "product": { "name": "IBM Business Automation Workflow", "product_id": "T019704", "product_identification_helper": { "cpe": "cpe:/a:ibm:business_automation_workflow:-" } } }, { "category": "product_version", "name": "24.0.0", "product": { "name": "IBM Business Automation Workflow 24.0.0", "product_id": "T036570", "product_identification_helper": { "cpe": "cpe:/a:ibm:business_automation_workflow:24.0.0" } } } ], "category": "product_name", "name": "Business Automation Workflow" }, { "branches": [ { "category": "product_version", "name": "8.5", "product": { "name": "IBM HTTP Server 8.5", "product_id": "T003676", "product_identification_helper": { "cpe": "cpe:/a:ibm:http_server:8.5" } } }, { "category": "product_version", "name": "9", "product": { "name": "IBM HTTP Server 9.0", "product_id": "T008162", "product_identification_helper": { "cpe": "cpe:/a:ibm:http_server:9.0" } } } ], "category": "product_name", "name": "HTTP Server" }, { "branches": [ { "category": "product_version_range", "name": "\u003c8.0.0.27", "product": { "name": "IBM Rational Build Forge \u003c8.0.0.27", "product_id": "T038286" } }, { "category": "product_version", "name": "8.0.0.27", "product": { "name": "IBM Rational Build Forge 8.0.0.27", "product_id": "T038286-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:rational_build_forge:8.0.0.27" } } } ], "category": "product_name", "name": "Rational Build Forge" }, { "branches": [ { "category": "product_version", "name": "9.1-9.1.0.6", "product": { "name": "IBM Rational ClearQuest 9.1-9.1.0.6", "product_id": "T034074", "product_identification_helper": { "cpe": "cpe:/a:ibm:rational_clearquest:9.1_-_9.1.0.6" } } }, { "category": "product_version", "name": "10.0-10.0.5", "product": { "name": "IBM Rational ClearQuest 10.0-10.0.5", "product_id": "T034075", "product_identification_helper": { "cpe": "cpe:/a:ibm:rational_clearquest:10.0_-_10.0.5" } } } ], "category": "product_name", "name": "Rational ClearQuest" }, { "branches": [ { "category": "product_version", "name": "6.3.0.7", "product": { "name": "IBM Tivoli Monitoring 6.3.0.7", "product_id": "342008", "product_identification_helper": { "cpe": "cpe:/a:ibm:tivoli_monitoring:6.3.0.7" } } } ], "category": "product_name", "name": "Tivoli Monitoring" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "RESF Rocky Linux", "product": { "name": "RESF Rocky Linux", "product_id": "T032255", "product_identification_helper": { "cpe": "cpe:/o:resf:rocky_linux:-" } } } ], "category": "vendor", "name": "RESF" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Xerox FreeFlow Print Server", "product": { "name": "Xerox FreeFlow Print Server", "product_id": "T010509", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:-" } } }, { "category": "product_version", "name": "v9", "product": { "name": "Xerox FreeFlow Print Server v9", "product_id": "T015632", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:v9" } } } ], "category": "product_name", "name": "FreeFlow Print Server" } ], "category": "vendor", "name": "Xerox" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-38709", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Apache HTTP Server. Diese Fehler bestehen in mehreren Komponenten wie dem Websocket, den Backreferences oder dem mod_rewrite Proxy-Handler, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einer NULL- Pointer-Dereferenz, einer serverseitigen Request Forgery oder einem Proxy-Codierungsproblem und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, die Authentifizierung zu umgehen oder vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T038706", "T038747", "67646", "T034902", "T038746", "T038705", "T038745", "T004914", "T038286", "T001663", "398363", "342008", "T010509", "T034899", "T034610", "T035727", "T003676", "T015632", "T034075", "T037028", "T012167", "T034074", "T039586", "T032255", "T039585", "74185", "T035762", "T036570", "2951", "T002207", "T000126", "T019704", "T038270", "T008162" ] }, "release_date": "2024-07-01T22:00:00.000+00:00", "title": "CVE-2023-38709" }, { "cve": "CVE-2024-36387", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Apache HTTP Server. Diese Fehler bestehen in mehreren Komponenten wie dem Websocket, den Backreferences oder dem mod_rewrite Proxy-Handler, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einer NULL- Pointer-Dereferenz, einer serverseitigen Request Forgery oder einem Proxy-Codierungsproblem und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, die Authentifizierung zu umgehen oder vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T038706", "T038747", "67646", "T034902", "T038746", "T038705", "T038745", "T004914", "T038286", "T001663", "398363", "342008", "T010509", "T034899", "T034610", "T035727", "T003676", "T015632", "T034075", "T037028", "T012167", "T034074", "T039586", "T032255", "T039585", "74185", "T035762", "T036570", "2951", "T002207", "T000126", "T019704", "T038270", "T008162" ] }, "release_date": "2024-07-01T22:00:00.000+00:00", "title": "CVE-2024-36387" }, { "cve": "CVE-2024-38472", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Apache HTTP Server. Diese Fehler bestehen in mehreren Komponenten wie dem Websocket, den Backreferences oder dem mod_rewrite Proxy-Handler, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einer NULL- Pointer-Dereferenz, einer serverseitigen Request Forgery oder einem Proxy-Codierungsproblem und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, die Authentifizierung zu umgehen oder vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T038706", "T038747", "67646", "T034902", "T038746", "T038705", "T038745", "T004914", "T038286", "T001663", "398363", "342008", "T010509", "T034899", "T034610", "T035727", "T003676", "T015632", "T034075", "T037028", "T012167", "T034074", "T039586", "T032255", "T039585", "74185", "T035762", "T036570", "2951", "T002207", "T000126", "T019704", "T038270", "T008162" ] }, "release_date": "2024-07-01T22:00:00.000+00:00", "title": "CVE-2024-38472" }, { "cve": "CVE-2024-38473", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Apache HTTP Server. Diese Fehler bestehen in mehreren Komponenten wie dem Websocket, den Backreferences oder dem mod_rewrite Proxy-Handler, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einer NULL- Pointer-Dereferenz, einer serverseitigen Request Forgery oder einem Proxy-Codierungsproblem und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, die Authentifizierung zu umgehen oder vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T038706", "T038747", "67646", "T034902", "T038746", "T038705", "T038745", "T004914", "T038286", "T001663", "398363", "342008", "T010509", "T034899", "T034610", "T035727", "T003676", "T015632", "T034075", "T037028", "T012167", "T034074", "T039586", "T032255", "T039585", "74185", "T035762", "T036570", "2951", "T002207", "T000126", "T019704", "T038270", "T008162" ] }, "release_date": "2024-07-01T22:00:00.000+00:00", "title": "CVE-2024-38473" }, { "cve": "CVE-2024-38474", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Apache HTTP Server. Diese Fehler bestehen in mehreren Komponenten wie dem Websocket, den Backreferences oder dem mod_rewrite Proxy-Handler, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einer NULL- Pointer-Dereferenz, einer serverseitigen Request Forgery oder einem Proxy-Codierungsproblem und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, die Authentifizierung zu umgehen oder vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T038706", "T038747", "67646", "T034902", "T038746", "T038705", "T038745", "T004914", "T038286", "T001663", "398363", "342008", "T010509", "T034899", "T034610", "T035727", "T003676", "T015632", "T034075", "T037028", "T012167", "T034074", "T039586", "T032255", "T039585", "74185", "T035762", "T036570", "2951", "T002207", "T000126", "T019704", "T038270", "T008162" ] }, "release_date": "2024-07-01T22:00:00.000+00:00", "title": "CVE-2024-38474" }, { "cve": "CVE-2024-38475", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Apache HTTP Server. Diese Fehler bestehen in mehreren Komponenten wie dem Websocket, den Backreferences oder dem mod_rewrite Proxy-Handler, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einer NULL- Pointer-Dereferenz, einer serverseitigen Request Forgery oder einem Proxy-Codierungsproblem und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, die Authentifizierung zu umgehen oder vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T038706", "T038747", "67646", "T034902", "T038746", "T038705", "T038745", "T004914", "T038286", "T001663", "398363", "342008", "T010509", "T034899", "T034610", "T035727", "T003676", "T015632", "T034075", "T037028", "T012167", "T034074", "T039586", "T032255", "T039585", "74185", "T035762", "T036570", "2951", "T002207", "T000126", "T019704", "T038270", "T008162" ] }, "release_date": "2024-07-01T22:00:00.000+00:00", "title": "CVE-2024-38475" }, { "cve": "CVE-2024-38476", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Apache HTTP Server. Diese Fehler bestehen in mehreren Komponenten wie dem Websocket, den Backreferences oder dem mod_rewrite Proxy-Handler, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einer NULL- Pointer-Dereferenz, einer serverseitigen Request Forgery oder einem Proxy-Codierungsproblem und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, die Authentifizierung zu umgehen oder vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T038706", "T038747", "67646", "T034902", "T038746", "T038705", "T038745", "T004914", "T038286", "T001663", "398363", "342008", "T010509", "T034899", "T034610", "T035727", "T003676", "T015632", "T034075", "T037028", "T012167", "T034074", "T039586", "T032255", "T039585", "74185", "T035762", "T036570", "2951", "T002207", "T000126", "T019704", "T038270", "T008162" ] }, "release_date": "2024-07-01T22:00:00.000+00:00", "title": "CVE-2024-38476" }, { "cve": "CVE-2024-38477", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Apache HTTP Server. Diese Fehler bestehen in mehreren Komponenten wie dem Websocket, den Backreferences oder dem mod_rewrite Proxy-Handler, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einer NULL- Pointer-Dereferenz, einer serverseitigen Request Forgery oder einem Proxy-Codierungsproblem und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, die Authentifizierung zu umgehen oder vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T038706", "T038747", "67646", "T034902", "T038746", "T038705", "T038745", "T004914", "T038286", "T001663", "398363", "342008", "T010509", "T034899", "T034610", "T035727", "T003676", "T015632", "T034075", "T037028", "T012167", "T034074", "T039586", "T032255", "T039585", "74185", "T035762", "T036570", "2951", "T002207", "T000126", "T019704", "T038270", "T008162" ] }, "release_date": "2024-07-01T22:00:00.000+00:00", "title": "CVE-2024-38477" }, { "cve": "CVE-2024-39573", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Apache HTTP Server. Diese Fehler bestehen in mehreren Komponenten wie dem Websocket, den Backreferences oder dem mod_rewrite Proxy-Handler, unter anderem aufgrund mehrerer sicherheitsrelevanter Probleme wie einer NULL- Pointer-Dereferenz, einer serverseitigen Request Forgery oder einem Proxy-Codierungsproblem und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, die Authentifizierung zu umgehen oder vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T038706", "T038747", "67646", "T034902", "T038746", "T038705", "T038745", "T004914", "T038286", "T001663", "398363", "342008", "T010509", "T034899", "T034610", "T035727", "T003676", "T015632", "T034075", "T037028", "T012167", "T034074", "T039586", "T032255", "T039585", "74185", "T035762", "T036570", "2951", "T002207", "T000126", "T019704", "T038270", "T008162" ] }, "release_date": "2024-07-01T22:00:00.000+00:00", "title": "CVE-2024-39573" } ] }
wid-sec-w-2024-3291
Vulnerability from csaf_certbund
Published
2024-10-28 23:00
Modified
2024-11-19 23:00
Summary
Apple macOS: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Apple macOS ausnutzen, um einen Denial of Service Angriff durchzuführen.
Betroffene Betriebssysteme
- MacOS X
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Apple macOS ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- MacOS X", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-3291 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3291.json" }, { "category": "self", "summary": "WID-SEC-2024-3291 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3291" }, { "category": "external", "summary": "Apple Security Advisory vom 2024-10-28", "url": "https://lists.apple.com/archives/security-announce/2024/Oct/msg00003.html" }, { "category": "external", "summary": "Apple Security Advisory vom 2024-10-28", "url": "https://lists.apple.com/archives/security-announce/2024/Oct/msg00004.html" }, { "category": "external", "summary": "Apple Security Advisory vom 2024-10-28", "url": "https://lists.apple.com/archives/security-announce/2024/Oct/msg00005.html" } ], "source_lang": "en-US", "title": "Apple macOS: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-11-19T23:00:00.000+00:00", "generator": { "date": "2024-11-20T09:18:38.712+00:00", "engine": { "name": "BSI-WID", "version": "1.3.8" } }, "id": "WID-SEC-W-2024-3291", "initial_release_date": "2024-10-28T23:00:00.000+00:00", "revision_history": [ { "date": "2024-10-28T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-11-19T23:00:00.000+00:00", "number": "2", "summary": "CVE Nummern erg\u00e4nzt" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "Sequoia \u003c15.1", "product": { "name": "Apple macOS Sequoia \u003c15.1", "product_id": "T038638" } }, { "category": "product_version", "name": "Sequoia 15.1", "product": { "name": "Apple macOS Sequoia 15.1", "product_id": "T038638-fixed", "product_identification_helper": { "cpe": "cpe:/o:apple:mac_os:sequoia__15.1" } } }, { "category": "product_version_range", "name": "Sonoma \u003c14.7.1", "product": { "name": "Apple macOS Sonoma \u003c14.7.1", "product_id": "T038639" } }, { "category": "product_version", "name": "Sonoma 14.7.1", "product": { "name": "Apple macOS Sonoma 14.7.1", "product_id": "T038639-fixed", "product_identification_helper": { "cpe": "cpe:/o:apple:mac_os:sonoma__14.7.1" } } }, { "category": "product_version_range", "name": "Ventura \u003c13.7.1", "product": { "name": "Apple macOS Ventura \u003c13.7.1", "product_id": "T038640" } }, { "category": "product_version", "name": "Ventura 13.7.1", "product": { "name": "Apple macOS Ventura 13.7.1", "product_id": "T038640-fixed", "product_identification_helper": { "cpe": "cpe:/o:apple:mac_os:ventura__13.7.1" } } } ], "category": "product_name", "name": "macOS" } ], "category": "vendor", "name": "Apple" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38476", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-38476" }, { "cve": "CVE-2024-38477", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-38477" }, { "cve": "CVE-2024-39573", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-39573" }, { "cve": "CVE-2024-40855", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-40855" }, { "cve": "CVE-2024-40858", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-40858" }, { "cve": "CVE-2024-44122", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44122" }, { "cve": "CVE-2024-44126", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44126" }, { "cve": "CVE-2024-44137", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44137" }, { "cve": "CVE-2024-44144", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44144" }, { "cve": "CVE-2024-44156", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44156" }, { "cve": "CVE-2024-44159", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44159" }, { "cve": "CVE-2024-44175", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44175" }, { "cve": "CVE-2024-44194", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44194" }, { "cve": "CVE-2024-44195", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44195" }, { "cve": "CVE-2024-44196", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44196" }, { "cve": "CVE-2024-44197", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44197" }, { "cve": "CVE-2024-44211", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44211" }, { "cve": "CVE-2024-44213", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44213" }, { "cve": "CVE-2024-44215", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44215" }, { "cve": "CVE-2024-44216", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44216" }, { "cve": "CVE-2024-44218", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44218" }, { "cve": "CVE-2024-44222", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44222" }, { "cve": "CVE-2024-44223", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44223" }, { "cve": "CVE-2024-44229", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44229" }, { "cve": "CVE-2024-44231", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44231" }, { "cve": "CVE-2024-44232", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44232" }, { "cve": "CVE-2024-44233", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44233" }, { "cve": "CVE-2024-44234", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44234" }, { "cve": "CVE-2024-44236", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44236" }, { "cve": "CVE-2024-44237", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44237" }, { "cve": "CVE-2024-44239", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44239" }, { "cve": "CVE-2024-44240", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44240" }, { "cve": "CVE-2024-44244", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44244" }, { "cve": "CVE-2024-44247", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44247" }, { "cve": "CVE-2024-44253", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44253" }, { "cve": "CVE-2024-44254", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44254" }, { "cve": "CVE-2024-44255", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44255" }, { "cve": "CVE-2024-44256", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44256" }, { "cve": "CVE-2024-44257", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44257" }, { "cve": "CVE-2024-44259", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44259" }, { "cve": "CVE-2024-44260", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44260" }, { "cve": "CVE-2024-44264", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44264" }, { "cve": "CVE-2024-44265", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44265" }, { "cve": "CVE-2024-44267", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44267" }, { "cve": "CVE-2024-44269", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44269" }, { "cve": "CVE-2024-44270", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44270" }, { "cve": "CVE-2024-44273", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44273" }, { "cve": "CVE-2024-44275", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44275" }, { "cve": "CVE-2024-44277", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44277" }, { "cve": "CVE-2024-44278", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44278" }, { "cve": "CVE-2024-44279", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44279" }, { "cve": "CVE-2024-44280", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44280" }, { "cve": "CVE-2024-44281", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44281" }, { "cve": "CVE-2024-44282", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44282" }, { "cve": "CVE-2024-44283", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44283" }, { "cve": "CVE-2024-44284", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44284" }, { "cve": "CVE-2024-44285", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44285" }, { "cve": "CVE-2024-44287", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44287" }, { "cve": "CVE-2024-44289", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44289" }, { "cve": "CVE-2024-44292", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44292" }, { "cve": "CVE-2024-44293", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44293" }, { "cve": "CVE-2024-44294", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44294" }, { "cve": "CVE-2024-44295", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44295" }, { "cve": "CVE-2024-44296", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44296" }, { "cve": "CVE-2024-44297", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44297" }, { "cve": "CVE-2024-44298", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44298" }, { "cve": "CVE-2024-44301", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44301" }, { "cve": "CVE-2024-44302", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS Sequoia, Sonoma und Ventura. Diese Fehler betreffen mehrere Komponenten, darunter Assets, Maps, Installer und Shortcuts, aufgrund einer Reihe von Sicherheitsl\u00fccken, die nicht im Detail offengelegt wurden. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, Daten zu ver\u00e4ndern, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben. Eine erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T038639", "T038638", "T038640" ] }, "release_date": "2024-10-28T23:00:00.000+00:00", "title": "CVE-2024-44302" } ] }
ghsa-phjg-7fch-3c2f
Vulnerability from github
Published
2024-07-01 21:31
Modified
2024-08-21 15:30
Severity ?
Details
null pointer dereference in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows an attacker to crash the server via a malicious request. Users are recommended to upgrade to version 2.4.60, which fixes this issue.
{ "affected": [], "aliases": [ "CVE-2024-38477" ], "database_specific": { "cwe_ids": [ "CWE-476" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-07-01T19:15:05Z", "severity": "HIGH" }, "details": "null pointer dereference in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows an attacker to crash the server via a malicious request.\nUsers are recommended to upgrade to version 2.4.60, which fixes this issue.", "id": "GHSA-phjg-7fch-3c2f", "modified": "2024-08-21T15:30:49Z", "published": "2024-07-01T21:31:14Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38477" }, { "type": "WEB", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20240712-0001" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.