Action not permitted
Modal body text goes here.
CVE-2014-0117
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:05:38.974Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1120599" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://advisories.mageia.org/MGASA-2014-0305.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT204659" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://httpd.apache.org/security/vulnerabilities_24.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/proxy_util.c?r1=1609680\u0026r2=1610674\u0026diff_format=h" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://zerodayinitiative.com/advisories/ZDI-14-239/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/proxy_util.c" }, { "name": "APPLE-SA-2015-04-08-2", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c" }, { "name": "20140722 Apache HTTPd - description of the CVE-2014-0117.", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2014/Jul/117" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c?r1=1599486\u0026r2=1610674\u0026diff_format=h" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-07-15T00:00:00", "descriptions": [ { "lang": "en", "value": "The mod_proxy module in the Apache HTTP Server 2.4.x before 2.4.10, when a reverse proxy is enabled, allows remote attackers to cause a denial of service (child-process crash) via a crafted HTTP Connection header." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-06T10:11:02", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1120599" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://advisories.mageia.org/MGASA-2014-0305.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT204659" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://httpd.apache.org/security/vulnerabilities_24.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/proxy_util.c?r1=1609680\u0026r2=1610674\u0026diff_format=h" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://zerodayinitiative.com/advisories/ZDI-14-239/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/proxy_util.c" }, { "name": "APPLE-SA-2015-04-08-2", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c" }, { "name": "20140722 Apache HTTPd - description of the CVE-2014-0117.", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2014/Jul/117" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c?r1=1599486\u0026r2=1610674\u0026diff_format=h" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-0117", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The mod_proxy module in the Apache HTTP Server 2.4.x before 2.4.10, when a reverse proxy is enabled, allows remote attackers to cause a denial of service (child-process crash) via a crafted HTTP Connection header." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1120599", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1120599" }, { "name": "http://advisories.mageia.org/MGASA-2014-0305.html", "refsource": "CONFIRM", "url": "http://advisories.mageia.org/MGASA-2014-0305.html" }, { "name": "https://support.apple.com/HT204659", "refsource": "CONFIRM", "url": "https://support.apple.com/HT204659" }, { "name": "http://httpd.apache.org/security/vulnerabilities_24.html", "refsource": "CONFIRM", "url": "http://httpd.apache.org/security/vulnerabilities_24.html" }, { "name": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/proxy_util.c?r1=1609680\u0026r2=1610674\u0026diff_format=h", "refsource": "CONFIRM", "url": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/proxy_util.c?r1=1609680\u0026r2=1610674\u0026diff_format=h" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "name": "http://zerodayinitiative.com/advisories/ZDI-14-239/", "refsource": "MISC", "url": "http://zerodayinitiative.com/advisories/ZDI-14-239/" }, { "name": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/proxy_util.c", "refsource": "CONFIRM", "url": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/proxy_util.c" }, { "name": "APPLE-SA-2015-04-08-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html" }, { "name": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c", "refsource": "CONFIRM", "url": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c" }, { "name": "20140722 Apache HTTPd - description of the CVE-2014-0117.", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2014/Jul/117" }, { "name": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c?r1=1599486\u0026r2=1610674\u0026diff_format=h", "refsource": "CONFIRM", "url": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c?r1=1599486\u0026r2=1610674\u0026diff_format=h" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-0117", "datePublished": "2014-07-20T10:00:00", "dateReserved": "2013-12-03T00:00:00", "dateUpdated": "2024-08-06T09:05:38.974Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2014-0117\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2014-07-20T11:12:48.823\",\"lastModified\":\"2023-11-07T02:18:09.703\",\"vulnStatus\":\"Modified\",\"evaluatorComment\":\"Per vendor advisory http://httpd.apache.org/security/vulnerabilities_24.html\\n\\\"A flaw was found in mod_proxy in httpd versions 2.4.6 to 2.4.9.\\\"\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"The mod_proxy module in the Apache HTTP Server 2.4.x before 2.4.10, when a reverse proxy is enabled, allows remote attackers to cause a denial of service (child-process crash) via a crafted HTTP Connection header.\"},{\"lang\":\"es\",\"value\":\"El m\u00f3dulo mod_proxy en Apache HTTP Server 2.4.x anterior a 2.4.10, cuando un proxy inverso est\u00e1 habilitado, permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda del proceso hijo) a trav\u00e9s de una cabecera de conexi\u00f3n HTTP manipulada.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":4.3},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FEAB0DF-04A9-4F99-8666-0BADC5D642B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7D924D1-8A36-4C43-9E56-52814F9A6350\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.4.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFA089AB-AF28-4AE1-AE39-6D1B8192A3DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39CDFECC-E26D-47E0-976F-6629040B3764\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"10.10.2\",\"matchCriteriaId\":\"045D7827-3EB8-43A1-AC80-9C94C395D364\"}]}]}],\"references\":[{\"url\":\"http://advisories.mageia.org/MGASA-2014-0305.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://httpd.apache.org/security/vulnerabilities_24.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://seclists.org/fulldisclosure/2014/Jul/117\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c?r1=1599486\u0026r2=1610674\u0026diff_format=h\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/proxy_util.c\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/proxy_util.c?r1=1609680\u0026r2=1610674\u0026diff_format=h\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://zerodayinitiative.com/advisories/ZDI-14-239/\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1120599\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://support.apple.com/HT204659\",\"source\":\"secalert@redhat.com\"}]}}" } }
var-201407-0515
Vulnerability from variot
The mod_proxy module in the Apache HTTP Server 2.4.x before 2.4.10, when a reverse proxy is enabled, allows remote attackers to cause a denial of service (child-process crash) via a crafted HTTP Connection header. Authentication is not required to exploit this vulnerability.The specific flaw exists within the mod_proxy module. The issue lies in the processing of HTTP headers when an invalid request is made. Successful exploits may allow an attacker to cause an affected application to crash, resulting in a denial-of-service condition. mod_proxy is one of the proxy modules.
Here are the details from the Slackware 14.1 ChangeLog: +--------------------------+ patches/packages/httpd-2.4.10-i486-1_slack14.1.txz: Upgraded. See directives DeflateInflateLimitRequestBody, DeflateInflateRatioLimit, and DeflateInflateRatioBurst. [Joe Orton, Eric Covener] ) SECURITY: CVE-2014-0231 (cve.mitre.org) mod_cgid: Fix a denial of service against CGI scripts that do not consume stdin that could lead to lingering HTTPD child processes filling up the scoreboard and eventually hanging the server. By default, the client I/O timeout (Timeout directive) now applies to communication with scripts. The CGIDScriptTimeout directive can be used to set a different timeout for communication with scripts. [Rainer Jung, Eric Covener, Yann Ylavic] For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0117 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0118 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0226 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0231 ( Security fix *) +--------------------------+
Where to find the new packages: +-----------------------------+
Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you.
Updated package for Slackware 13.0: ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/httpd-2.2.27-i486-1_slack13.0.txz
Updated package for Slackware x86_64 13.0: ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/httpd-2.2.27-x86_64-1_slack13.0.txz
Updated package for Slackware 13.1: ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/httpd-2.2.27-i486-1_slack13.1.txz
Updated package for Slackware x86_64 13.1: ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/httpd-2.2.27-x86_64-1_slack13.1.txz
Updated package for Slackware 13.37: ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/httpd-2.2.27-i486-1_slack13.37.txz
Updated package for Slackware x86_64 13.37: ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/httpd-2.2.27-x86_64-1_slack13.37.txz
Updated package for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/httpd-2.4.10-i486-1_slack14.0.txz
Updated package for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/httpd-2.4.10-x86_64-1_slack14.0.txz
Updated package for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/httpd-2.4.10-i486-1_slack14.1.txz
Updated package for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/httpd-2.4.10-x86_64-1_slack14.1.txz
Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/httpd-2.4.10-i486-1.txz
Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/httpd-2.4.10-x86_64-1.txz
MD5 signatures: +-------------+
Slackware 13.0 package: c79e696c379625efd18e6414f30dba80 httpd-2.2.27-i486-1_slack13.0.txz
Slackware x86_64 13.0 package: 28be181b3a0aae494371279230f190e9 httpd-2.2.27-x86_64-1_slack13.0.txz
Slackware 13.1 package: fc409fff4d79cb1969a40756f8a9f576 httpd-2.2.27-i486-1_slack13.1.txz
Slackware x86_64 13.1 package: 07ab0f3337fc15656cd2e841c9b0eba4 httpd-2.2.27-x86_64-1_slack13.1.txz
Slackware 13.37 package: b5cefd8903745aceaa68b482cb63e4e2 httpd-2.2.27-i486-1_slack13.37.txz
Slackware x86_64 13.37 package: 610a33703e7f84fd14f09bc9529c1cd5 httpd-2.2.27-x86_64-1_slack13.37.txz
Slackware 14.0 package: d6dedc1064a6a4d039b188fed02de89b httpd-2.4.10-i486-1_slack14.0.txz
Slackware x86_64 14.0 package: 7d150bf3bd558bf70ea2c21a08a1b5b7 httpd-2.4.10-x86_64-1_slack14.0.txz
Slackware 14.1 package: 7e9b03930b0452a95595a61cf1b093d8 httpd-2.4.10-i486-1_slack14.1.txz
Slackware x86_64 14.1 package: efc9893a3428d87a8d78787fbde793e0 httpd-2.4.10-x86_64-1_slack14.1.txz
Slackware -current package: 1ac5a4cc6275c8f7cfa6e3a77a27f2db n/httpd-2.4.10-i486-1.txz
Slackware x86_64 -current package: 7fa5fda601a324238f5a2768204a7476 n/httpd-2.4.10-x86_64-1.txz
Installation instructions: +------------------------+
Upgrade the package as root:
upgradepkg httpd-2.4.10-i486-1_slack14.1.txz
Then, restart Apache httpd:
/etc/rc.d/rc.httpd stop
/etc/rc.d/rc.httpd start
+-----+
Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com
+------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
APPLE-SA-2015-04-08-2 OS X 10.10.3 and Security Update 2015-004
OS X Yosemite 10.10.3 and Security Update 2015-004 are now available and address the following:
Admin Framework Available for: OS X Yosemite v10.10 to v10.10.2 Impact: A process may gain admin privileges without properly authenticating Description: An issue existed when checking XPC entitlements. This issue was addressed with improved entitlement checking. CVE-ID CVE-2015-1130 : Emil Kvarnhammar at TrueSec
apache Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.2 Impact: Multiple vulnerabilities in Apache Description: Multiple vulnerabilities existed in Apache versions prior to 2.4.10 and 2.2.29, including one that may allow a remote attacker to execute arbitrary code. These issues were addressed by updating Apache to versions 2.4.10 and 2.2.29 CVE-ID CVE-2013-0118 CVE-2013-5704 CVE-2013-6438 CVE-2014-0098 CVE-2014-0117 CVE-2014-0118 CVE-2014-0226 CVE-2014-0231 CVE-2014-3523
ATS Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.2 Impact: A local user may be able to execute arbitrary code with system privileges Description: Multiple input validation issues existed in fontd. These issues were addressed through improved input validation. CVE-ID CVE-2015-1131 : Ian Beer of Google Project Zero CVE-2015-1132 : Ian Beer of Google Project Zero CVE-2015-1133 : Ian Beer of Google Project Zero CVE-2015-1134 : Ian Beer of Google Project Zero CVE-2015-1135 : Ian Beer of Google Project Zero
Certificate Trust Policy Impact: Update to the certificate trust policy Description: The certificate trust policy was updated. The complete list of certificates may be viewed at https://support.apple.com/en- us/HT202858.
CFNetwork HTTPProtocol Available for: OS X Yosemite v10.10 to v10.10.2 Impact: Cookies belonging to one origin may be sent to another origin Description: A cross-domain cookie issue existed in redirect handling. Cookies set in a redirect response could be passed on to a redirect target belonging to another origin. The issue was address through improved handling of redirects. CVE-ID CVE-2015-1089 : Niklas Keller
CFNetwork Session Available for: OS X Yosemite v10.10 to v10.10.2 Impact: Authentication credentials may be sent to a server on another origin Description: A cross-domain HTTP request headers issue existed in redirect handling. The issue was addressed through improved handling of redirects. CVE-ID CVE-2015-1091 : Diego Torres (http://dtorres.me)
CFURL Available for: OS X Yosemite v10.10 to v10.10.2 Impact: Visiting a maliciously crafted website may lead to arbitrary code execution Description: An input validation issue existed within URL processing. This issue was addressed through improved URL validation. CVE-ID CVE-2015-1088 : Luigi Galli
CoreAnimation Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.2 Impact: Visiting a maliciously crafted website may lead to arbitrary code execution Description: A use-after-free issue existed in CoreAnimation. This issue was addressed through improved mutex management. CVE-ID CVE-2015-1136 : Apple
FontParser Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.2 Impact: Processing a maliciously crafted font file may lead to arbitrary code execution Description: Multiple memory corruption issues existed in the processing of font files. These issues were addressed through improved bounds checking. CVE-ID CVE-2015-1093 : Marc Schoenefeld
Graphics Driver Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.2 Impact: A local user may be able to execute arbitrary code with system privileges Description: A NULL pointer dereference existed in NVIDIA graphics driver's handling of certain IOService userclient types. This issue was addressed through additional context validation. CVE-ID CVE-2015-1137 : Frank Graziano and John Villamil of the Yahoo Pentest Team
Hypervisor Available for: OS X Yosemite v10.10 to v10.10.2 Impact: A local application may be able to cause a denial of service Description: An input validation issue existed in the hypervisor framework. This issue was addressed through improved input validation. CVE-ID CVE-2015-1138 : Izik Eidus and Alex Fishman
ImageIO Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.2 Impact: Processing a maliciously crafted .sgi file may lead to arbitrary code execution Description: A memory corruption issue existed in the handling of .sgi files. This issue was addressed through improved bounds checking. CVE-ID CVE-2015-1139 : Apple
IOHIDFamily Available for: OS X Yosemite v10.10 to v10.10.2 Impact: A malicious HID device may be able to cause arbitrary code execution Description: A memory corruption issue existed in an IOHIDFamily API. This issue was addressed through improved memory handling. CVE-ID CVE-2015-1095 : Andrew Church
IOHIDFamily Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.2 Impact: A local user may be able to execute arbitrary code with system privileges Description: A buffer overflow issue existed in IOHIDFamily. This issue was addressed through improved memory handling. CVE-ID CVE-2015-1140 : lokihardt@ASRT working with HP's Zero Day Initiative, Luca Todesco
IOHIDFamily Available for: OS X Yosemite v10.10 to v10.10.2 Impact: A local user may be able to determine kernel memory layout Description: An issue existed in IOHIDFamily that led to the disclosure of kernel memory content. This issue was addressed through improved bounds checking. CVE-ID CVE-2015-1096 : Ilja van Sprundel of IOActive
IOHIDFamily Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A heap buffer overflow existed in IOHIDFamily's handling of key-mapping properties. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-4404 : Ian Beer of Google Project Zero
IOHIDFamily Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A null pointer dereference existed in IOHIDFamily's handling of key-mapping properties. This issue was addressed through improved validation of IOHIDFamily key-mapping properties. CVE-ID CVE-2014-4405 : Ian Beer of Google Project Zero
IOHIDFamily Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5 Impact: A user may be able to execute arbitrary code with system privileges Description: An out-of-bounds write issue exited in the IOHIDFamily driver. The issue was addressed through improved input validation. CVE-ID CVE-2014-4380 : cunzhang from Adlab of Venustech
Kernel Available for: OS X Yosemite v10.10 to v10.10.2 Impact: A local user may be able to cause unexpected system shutdown Description: An issue existed in the handling of virtual memory operations within the kernel. The issue is fixed through improved handling of the mach_vm_read operation. CVE-ID CVE-2015-1141 : Ole Andre Vadla Ravnas of www.frida.re
Kernel Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.2 Impact: A local user may be able to cause a system denial of service Description: A race condition existed in the kernel's setreuid system call. This issue was addressed through improved state management. CVE-ID CVE-2015-1099 : Mark Mentovai of Google Inc.
Kernel Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.2 Impact: A local application may escalate privileges using a compromised service intended to run with reduced privileges Description: setreuid and setregid system calls failed to drop privileges permanently. This issue was addressed by correctly dropping privileges. CVE-ID CVE-2015-1117 : Mark Mentovai of Google Inc.
Kernel Available for: OS X Yosemite v10.10 to v10.10.2 Impact: An attacker with a privileged network position may be able to redirect user traffic to arbitrary hosts Description: ICMP redirects were enabled by default on OS X. This issue was addressed by disabling ICMP redirects. CVE-ID CVE-2015-1103 : Zimperium Mobile Security Labs
Kernel Available for: OS X Yosemite v10.10 to v10.10.2 Impact: An attacker with a privileged network position may be able to cause a denial of service Description: A state inconsistency existed in the processing of TCP headers. This issue was addressed through improved state handling. CVE-ID CVE-2015-1102 : Andrey Khudyakov and Maxim Zhuravlev of Kaspersky Lab
Kernel Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.2 Impact: A local user may be able to cause unexpected system termination or read kernel memory Description: A out of bounds memory access issue existed in the kernel. This issue was addressed through improved memory handling. CVE-ID CVE-2015-1100 : Maxime Villard of m00nbsd
Kernel Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.2 Impact: A remote attacker may be able to bypass network filters Description: The system would treat some IPv6 packets from remote network interfaces as local packets. The issue was addressed by rejecting these packets. CVE-ID CVE-2015-1104 : Stephen Roettger of the Google Security Team
Kernel Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.2 Impact: A local user may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue existed in the kernel. This issue was addressed through improved memory handling. CVE-ID CVE-2015-1101 : lokihardt@ASRT working with HP's Zero Day Initiative
Kernel Available for: OS X Yosemite v10.10 to v10.10.2 Impact: A remote attacker may be able to cause a denial of service Description: A state inconsistency issue existed in the handling of TCP out of band data. This issue was addressed through improved state management. CVE-ID CVE-2015-1105 : Kenton Varda of Sandstorm.io
LaunchServices Available for: OS X Yosemite v10.10 to v10.10.2 Impact: A local user may be able to cause the Finder to crash Description: An input validation issue existed in LaunchServices's handling of application localization data. This issue was addressed through improved validation of localization data. CVE-ID CVE-2015-1142
LaunchServices Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.2 Impact: A local user may be able to execute arbitrary code with system privileges Description: A type confusion issue existed in LaunchServices's handling of localized strings. This issue was addressed through additional bounds checking. CVE-ID CVE-2015-1143 : Apple
libnetcore Available for: OS X Yosemite v10.10 to v10.10.2 Impact: Processing a maliciously crafted configuration profile may lead to unexpected application termination Description: A memory corruption issue existed in the handling of configuration profiles. This issue was addressed through improved bounds checking. CVE-ID CVE-2015-1118 : Zhaofeng Chen, Hui Xue, Yulong Zhang, and Tao Wei of FireEye, Inc.
ntp Available for: OS X Yosemite v10.10 to v10.10.2 Impact: A remote attacker may brute force ntpd authentication keys Description: The config_auth function in ntpd generated a weak key when an authentication key was not configured. This issue was addressed by improved key generation. CVE-ID CVE-2014-9298
OpenLDAP Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.2 Impact: A remote unauthenticated client may be able to cause a denial of service Description: Multiple input validation issues existed in OpenLDAP. These issues were addressed by improved input validation. CVE-ID CVE-2015-1545 : Ryan Tandy CVE-2015-1546 : Ryan Tandy
OpenSSL Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.2 Impact: Multiple vulnerabilities in OpenSSL Description: Multiple vulnerabilities existed in OpenSSL 0.9.8zc, including one that may allow an attacker to intercept connections to a server that supports export-grade ciphers. These issues were addressed by updating OpenSSL to version 0.9.8zd. CVE-ID CVE-2014-3569 CVE-2014-3570 CVE-2014-3571 CVE-2014-3572 CVE-2014-8275 CVE-2015-0204
Open Directory Client Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.2 Impact: A password might be sent unencrypted over the network when using Open Directory from OS X Server Description: If an Open Directory client was bound to an OS X Server but did not install the certificates of the OS X Server, and then a user on that client changed their password, the password change request was sent over the network without encryption. This issue was addressed by having the client require encryption for this case. CVE-ID CVE-2015-1147 : Apple
PHP Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.2 Impact: Multiple vulnerabilities in PHP Description: Multiple vulnerabilities existed in PHP versions prior to 5.3.29, 5.4.38, and 5.5.20, including one which may have led to arbitrary code execution. This update addresses the issues by updating PHP to versions 5.3.29, 5.4.38, and 5.5.20. CVE-ID CVE-2013-6712 CVE-2014-0207 CVE-2014-0237 CVE-2014-0238 CVE-2014-2497 CVE-2014-3478 CVE-2014-3479 CVE-2014-3480 CVE-2014-3487 CVE-2014-3538 CVE-2014-3587 CVE-2014-3597 CVE-2014-3668 CVE-2014-3669 CVE-2014-3670 CVE-2014-3710 CVE-2014-3981 CVE-2014-4049 CVE-2014-4670 CVE-2014-4698 CVE-2014-5120
QuickLook Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.2 Impact: Opening a maliciously crafted iWork file may lead to arbitrary code execution Description: A memory corruption issue existed in the handling of iWork files. This issue was addressed through improved memory handling. CVE-ID CVE-2015-1098 : Christopher Hickstein
SceneKit Available for: OS X Mountain Lion v10.8.5 Impact: Viewing a maliciously crafted Collada file may lead to arbitrary code execution Description: A heap buffer overflow existed in SceneKit's handling of Collada files. Viewing a maliciously crafted Collada file may have led to arbitrary code execution. This issue was addressed through improved validation of accessor elements. CVE-ID CVE-2014-8830 : Jose Duart of Google Security Team
Screen Sharing Available for: OS X Yosemite v10.10 to v10.10.2 Impact: A user's password may be logged to a local file Description: In some circumstances, Screen Sharing may log a user's password that is not readable by other users on the system. This issue was addressed by removing logging of credential. CVE-ID CVE-2015-1148 : Apple
Security - Code Signing Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.2 Impact: Tampered applications may not be prevented from launching Description: Applications containing specially crafted bundles may have been able to launch without a completely valid signature. This issue was addressed by adding additional checks. CVE-ID CVE-2015-1145 CVE-2015-1146
UniformTypeIdentifiers Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.2 Impact: A local user may be able to execute arbitrary code with system privileges Description: A buffer overflow existed in the way Uniform Type Identifiers were handled. This issue was addressed with improved bounds checking. CVE-ID CVE-2015-1144 : Apple
WebKit Available for: OS X Yosemite v10.10 to v10.10.2 Impact: Visiting a maliciously crafted website may lead to arbitrary code execution Description: A memory corruption issue existed in WebKit. This issues was addressed through improved memory handling. CVE-ID CVE-2015-1069 : lokihardt@ASRT working with HP's Zero Day Initiative
Security Update 2015-004 (available for OS X Mountain Lion v10.8.5 and OS X Mavericks v10.9.5) also addresses an issue caused by the fix for CVE-2015-1067 in Security Update 2015-002. This issue prevented Remote Apple Events clients on any version from connecting to the Remote Apple Events server. In default configurations, Remote Apple Events is not enabled.
OS X Yosemite 10.10.3 includes the security content of Safari 8.0.5. https://support.apple.com/en-us/HT204658
OS X Yosemite 10.10.3 and Security Update 2015-004 may be obtained from the Mac App Store or Apple's Software Downloads web site: http://www.apple.com/support/downloads/
Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.22 (Darwin) Comment: GPGTools - http://gpgtools.org
iQIcBAEBAgAGBQJVJKj2AAoJEBcWfLTuOo7tDh4QAK0LxfwMRKcdOXOKpXsRz6lg lhZ+CLVcSepq8qBkFQ74f3B5CuhxD0IGQPaAuSXl51tWYdfN+92tkbmyZ9k8901l +I0vw6upeE+oqRnGtSRzq68UhcARbdV8V1+C0Xl3IIuuHc+xlEgvklDhF9Pc8XM6 DudGiVNqt6MOqd5Oc4s4FFF0nnpnyG9+UJem3mi4Ee88PwI4x1Hev7utPPmaPDzj cjkVeislko3QArNJxtBpkYudErA4eR5OX8Tdf12jAmPTtjrXUb3VigEf78Nna0RW kHTOGdB5EZ+YFZ8KlyIQlENBjTtI8CGdCF4/S/2xDN83NTRsimd5Y7LSjdd0uANo pqxAc3Gzn5xngWF1Qbb6V+XZBfz5NoeTq5BXBB5OHz4PSGaQuMsBA2RYFMzNLqWv D/T5U1JtzRLALt0lYAz63B0OhW7KXeLI9oer1Vo4wWF9O9cUFyuSI4JU5uYLQpJX kEpSFt4YPFFxMnlzCLzLkmVGax4w9M/tRHYeSKAnRlnsoPBtIGFItlNZE2RduD/R 5n2APoJa3banQ8miycGORYP3WsktDRZzBy+2QPWuz8sE3AvAkO9xWp8PrQBkqf/b 6CIG5UkCYITG2uzBXqnGbfDiEDvBLNN1Yq0ZZI23iYRxrdW0I0pv1CHio354q12G vVE37tYUU4PnLfwlcazq =MOsT -----END PGP SIGNATURE----- .
mod_lua.c in the mod_lua module in the Apache HTTP Server through 2.4.10 does not support an httpd configuration in which the same Lua authorization provider is used with different arguments within different contexts, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging multiple Require directives, as demonstrated by a configuration that specifies authorization for one group to access a certain directory, and authorization for a second group to access a second directory (CVE-2014-8109). A malicious client could use Trailer headers to set additional HTTP headers after header processing was performed by other modules. This could, for example, lead to a bypass of header restrictions defined with mod_headers (CVE-2013-5704). A newly introduced configuration directive MergeTrailers can be used to re-enable the old method of processing Trailer headers, which also re-introduces the aforementioned flaw.
This update also fixes the following bug:
Prior to this update, the mod_proxy_wstunnel module failed to set up an SSL connection when configured to use a back end server using the wss: URL scheme, causing proxied connections to fail. In these updated packages, SSL is used when proxying to wss: back end servers (rhbz#1141950). The verification of md5 checksums and GPG signatures is performed automatically for you. 7) - noarch, x86_64
- -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Important: httpd security update Advisory ID: RHSA-2014:0921-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0921.html Issue date: 2014-07-23 CVE Names: CVE-2013-4352 CVE-2014-0117 CVE-2014-0118 CVE-2014-0226 CVE-2014-0231 =====================================================================
- Summary:
Updated httpd packages that fix multiple security issues are now available for Red Hat Enterprise Linux 7.
The Red Hat Security Response Team has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Client Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
A race condition flaw, leading to heap-based buffer overflows, was found in the mod_status httpd module. A remote attacker able to access a status page served by mod_status on a server using a threaded Multi-Processing Module (MPM) could send a specially crafted request that would cause the httpd child process to crash or, possibly, allow the attacker to execute arbitrary code with the privileges of the "apache" user. (CVE-2014-0226)
A NULL pointer dereference flaw was found in the mod_cache httpd module. (CVE-2013-4352)
A denial of service flaw was found in the mod_proxy httpd module. (CVE-2014-0117)
A denial of service flaw was found in the way httpd's mod_deflate module handled request body decompression (configured via the "DEFLATE" input filter). A remote attacker able to send a request whose body would be decompressed could use this flaw to consume an excessive amount of system memory and CPU on the target system. (CVE-2014-0118)
A denial of service flaw was found in the way httpd's mod_cgid module executed CGI scripts that did not read data from the standard input. A remote attacker could submit a specially crafted request that would cause the httpd child process to hang indefinitely. (CVE-2014-0231)
All httpd users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, the httpd daemon will be restarted automatically.
- Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1120596 - CVE-2014-0231 httpd: mod_cgid denial of service 1120599 - CVE-2014-0117 httpd: mod_proxy denial of service 1120601 - CVE-2014-0118 httpd: mod_deflate denial of service 1120603 - CVE-2014-0226 httpd: mod_status heap-based buffer overflow 1120604 - CVE-2013-4352 httpd: mod_cache NULL pointer dereference crash
- Package List:
Red Hat Enterprise Linux Client Optional (v. 7):
Source: httpd-2.4.6-18.el7_0.src.rpm
noarch: httpd-manual-2.4.6-18.el7_0.noarch.rpm
x86_64: httpd-2.4.6-18.el7_0.x86_64.rpm httpd-debuginfo-2.4.6-18.el7_0.x86_64.rpm httpd-devel-2.4.6-18.el7_0.x86_64.rpm httpd-tools-2.4.6-18.el7_0.x86_64.rpm mod_ldap-2.4.6-18.el7_0.x86_64.rpm mod_proxy_html-2.4.6-18.el7_0.x86_64.rpm mod_session-2.4.6-18.el7_0.x86_64.rpm mod_ssl-2.4.6-18.el7_0.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
Source: httpd-2.4.6-18.el7_0.src.rpm
noarch: httpd-manual-2.4.6-18.el7_0.noarch.rpm
x86_64: httpd-2.4.6-18.el7_0.x86_64.rpm httpd-debuginfo-2.4.6-18.el7_0.x86_64.rpm httpd-devel-2.4.6-18.el7_0.x86_64.rpm httpd-tools-2.4.6-18.el7_0.x86_64.rpm mod_ldap-2.4.6-18.el7_0.x86_64.rpm mod_proxy_html-2.4.6-18.el7_0.x86_64.rpm mod_session-2.4.6-18.el7_0.x86_64.rpm mod_ssl-2.4.6-18.el7_0.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: httpd-2.4.6-18.el7_0.src.rpm
noarch: httpd-manual-2.4.6-18.el7_0.noarch.rpm
ppc64: httpd-2.4.6-18.el7_0.ppc64.rpm httpd-debuginfo-2.4.6-18.el7_0.ppc64.rpm httpd-devel-2.4.6-18.el7_0.ppc64.rpm httpd-tools-2.4.6-18.el7_0.ppc64.rpm mod_ssl-2.4.6-18.el7_0.ppc64.rpm
s390x: httpd-2.4.6-18.el7_0.s390x.rpm httpd-debuginfo-2.4.6-18.el7_0.s390x.rpm httpd-devel-2.4.6-18.el7_0.s390x.rpm httpd-tools-2.4.6-18.el7_0.s390x.rpm mod_ssl-2.4.6-18.el7_0.s390x.rpm
x86_64: httpd-2.4.6-18.el7_0.x86_64.rpm httpd-debuginfo-2.4.6-18.el7_0.x86_64.rpm httpd-devel-2.4.6-18.el7_0.x86_64.rpm httpd-tools-2.4.6-18.el7_0.x86_64.rpm mod_ssl-2.4.6-18.el7_0.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64: httpd-debuginfo-2.4.6-18.el7_0.ppc64.rpm mod_ldap-2.4.6-18.el7_0.ppc64.rpm mod_proxy_html-2.4.6-18.el7_0.ppc64.rpm mod_session-2.4.6-18.el7_0.ppc64.rpm
s390x: httpd-debuginfo-2.4.6-18.el7_0.s390x.rpm mod_ldap-2.4.6-18.el7_0.s390x.rpm mod_proxy_html-2.4.6-18.el7_0.s390x.rpm mod_session-2.4.6-18.el7_0.s390x.rpm
x86_64: httpd-debuginfo-2.4.6-18.el7_0.x86_64.rpm mod_ldap-2.4.6-18.el7_0.x86_64.rpm mod_proxy_html-2.4.6-18.el7_0.x86_64.rpm mod_session-2.4.6-18.el7_0.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: httpd-2.4.6-18.el7_0.src.rpm
noarch: httpd-manual-2.4.6-18.el7_0.noarch.rpm
x86_64: httpd-2.4.6-18.el7_0.x86_64.rpm httpd-debuginfo-2.4.6-18.el7_0.x86_64.rpm httpd-devel-2.4.6-18.el7_0.x86_64.rpm httpd-tools-2.4.6-18.el7_0.x86_64.rpm mod_ssl-2.4.6-18.el7_0.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64: httpd-debuginfo-2.4.6-18.el7_0.x86_64.rpm mod_ldap-2.4.6-18.el7_0.x86_64.rpm mod_proxy_html-2.4.6-18.el7_0.x86_64.rpm mod_session-2.4.6-18.el7_0.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package
- References:
https://www.redhat.com/security/data/cve/CVE-2013-4352.html https://www.redhat.com/security/data/cve/CVE-2014-0117.html https://www.redhat.com/security/data/cve/CVE-2014-0118.html https://www.redhat.com/security/data/cve/CVE-2014-0226.html https://www.redhat.com/security/data/cve/CVE-2014-0231.html https://access.redhat.com/security/updates/classification/#important
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFTz4k8XlSAg2UNWIIRAhYKAJ9g2VrkFgyFz55UEfv0x8fGXSyjwACghfJ7 zOzeWbMF1aXEVExM5K4QNMA= =qBwW -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . ============================================================================ Ubuntu Security Notice USN-2299-1 July 23, 2014
apache2 vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS
Summary:
Several security issues were fixed in Apache HTTP Server. This issue only affected Ubuntu 14.04 LTS. (CVE-2014-0118)
Marek Kroemeke and others discovered that the mod_status module incorrectly handled certain requests. (CVE-2014-0226)
Rainer Jung discovered that the mod_cgid module incorrectly handled certain scripts. (CVE-2014-0231)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 14.04 LTS: apache2-bin 2.4.7-1ubuntu4.1
Ubuntu 12.04 LTS: apache2.2-bin 2.2.22-1ubuntu1.7
Ubuntu 10.04 LTS: apache2.2-bin 2.2.14-5ubuntu8.14
In general, a standard system update will make all the necessary changes
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201407-0515", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "http server", "scope": "eq", "trust": 1.6, "vendor": "apache", "version": "2.4.9" }, { "model": "http server", "scope": "eq", "trust": 1.6, "vendor": "apache", "version": "2.4.7" }, { "model": "http server", "scope": "eq", "trust": 1.6, "vendor": "apache", "version": "2.4.6" }, { "model": "http server", "scope": "eq", "trust": 1.6, "vendor": "apache", "version": "2.4.8" }, { "model": "mac os x", "scope": "lte", "trust": 1.0, "vendor": "apple", "version": "10.10.2" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "10.10 to 10.10.2" }, { "model": "http server", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "12.1.3.0" }, { "model": "http server", "scope": "eq", "trust": 0.8, "vendor": "apache", "version": "2.4.10" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "10.9.5" }, { "model": "http server", "scope": "lt", "trust": 0.8, "vendor": "apache", "version": "2.4.x" }, { "model": "enterprise manager", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "of enterprise manager ops center 11.1.3" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "10.8.5" }, { "model": "http server", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "11.1.1.7.0" }, { "model": "http server", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "10.1.3.5.0" }, { "model": "enterprise manager", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "of enterprise manager ops center 12.1.4" }, { "model": "http server", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "12.1.2.0" }, { "model": "httpd server 2.x", "scope": null, "trust": 0.7, "vendor": "apache", "version": null }, { "model": "linux lts", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "14.04" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "7" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.9.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.8.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.10.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.10.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.10" }, { "model": "apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.4.9" }, { "model": "apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.4.8" }, { "model": "apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.4.7" }, { "model": "apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.4.6" }, { "model": "mac os", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.10.3" }, { "model": "2.4.10-dev", "scope": "ne", "trust": 0.3, "vendor": "apache", "version": null } ], "sources": [ { "db": "ZDI", "id": "ZDI-14-239" }, { "db": "BID", "id": "68740" }, { "db": "JVNDB", "id": "JVNDB-2014-003472" }, { "db": "NVD", "id": "CVE-2014-0117" }, { "db": "CNNVD", "id": "CNNVD-201407-491" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.4.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.4.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.4.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.4.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.10.2", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2014-0117" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "AKAT-1 22733db72ab3ed94b5f8a1ffcde850251fe6f466 Marek Kroemeke", "sources": [ { "db": "ZDI", "id": "ZDI-14-239" } ], "trust": 0.7 }, "cve": "CVE-2014-0117", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2014-0117", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "ZDI", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2014-0117", "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.7, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-67610", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2014-0117", "trust": 1.8, "value": "MEDIUM" }, { "author": "ZDI", "id": "CVE-2014-0117", "trust": 0.7, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201407-491", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-67610", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-14-239" }, { "db": "VULHUB", "id": "VHN-67610" }, { "db": "JVNDB", "id": "JVNDB-2014-003472" }, { "db": "NVD", "id": "CVE-2014-0117" }, { "db": "CNNVD", "id": "CNNVD-201407-491" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The mod_proxy module in the Apache HTTP Server 2.4.x before 2.4.10, when a reverse proxy is enabled, allows remote attackers to cause a denial of service (child-process crash) via a crafted HTTP Connection header. Authentication is not required to exploit this vulnerability.The specific flaw exists within the mod_proxy module. The issue lies in the processing of HTTP headers when an invalid request is made. \nSuccessful exploits may allow an attacker to cause an affected application to crash, resulting in a denial-of-service condition. mod_proxy is one of the proxy modules. \n\n\nHere are the details from the Slackware 14.1 ChangeLog:\n+--------------------------+\npatches/packages/httpd-2.4.10-i486-1_slack14.1.txz: Upgraded. See directives\n DeflateInflateLimitRequestBody, DeflateInflateRatioLimit,\n and DeflateInflateRatioBurst. [Joe Orton, Eric Covener]\n *) SECURITY: CVE-2014-0231 (cve.mitre.org)\n mod_cgid: Fix a denial of service against CGI scripts that do\n not consume stdin that could lead to lingering HTTPD child processes\n filling up the scoreboard and eventually hanging the server. By\n default, the client I/O timeout (Timeout directive) now applies to\n communication with scripts. The CGIDScriptTimeout directive can be\n used to set a different timeout for communication with scripts. \n [Rainer Jung, Eric Covener, Yann Ylavic]\n For more information, see:\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0117\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0118\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0226\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0231\n (* Security fix *)\n+--------------------------+\n\n\nWhere to find the new packages:\n+-----------------------------+\n\nThanks to the friendly folks at the OSU Open Source Lab\n(http://osuosl.org) for donating FTP and rsync hosting\nto the Slackware project! :-)\n\nAlso see the \"Get Slack\" section on http://slackware.com for\nadditional mirror sites near you. \n\nUpdated package for Slackware 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/httpd-2.2.27-i486-1_slack13.0.txz\n\nUpdated package for Slackware x86_64 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/httpd-2.2.27-x86_64-1_slack13.0.txz\n\nUpdated package for Slackware 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/httpd-2.2.27-i486-1_slack13.1.txz\n\nUpdated package for Slackware x86_64 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/httpd-2.2.27-x86_64-1_slack13.1.txz\n\nUpdated package for Slackware 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/httpd-2.2.27-i486-1_slack13.37.txz\n\nUpdated package for Slackware x86_64 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/httpd-2.2.27-x86_64-1_slack13.37.txz\n\nUpdated package for Slackware 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/httpd-2.4.10-i486-1_slack14.0.txz\n\nUpdated package for Slackware x86_64 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/httpd-2.4.10-x86_64-1_slack14.0.txz\n\nUpdated package for Slackware 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/httpd-2.4.10-i486-1_slack14.1.txz\n\nUpdated package for Slackware x86_64 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/httpd-2.4.10-x86_64-1_slack14.1.txz\n\nUpdated package for Slackware -current:\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/httpd-2.4.10-i486-1.txz\n\nUpdated package for Slackware x86_64 -current:\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/httpd-2.4.10-x86_64-1.txz\n\n\nMD5 signatures:\n+-------------+\n\nSlackware 13.0 package:\nc79e696c379625efd18e6414f30dba80 httpd-2.2.27-i486-1_slack13.0.txz\n\nSlackware x86_64 13.0 package:\n28be181b3a0aae494371279230f190e9 httpd-2.2.27-x86_64-1_slack13.0.txz\n\nSlackware 13.1 package:\nfc409fff4d79cb1969a40756f8a9f576 httpd-2.2.27-i486-1_slack13.1.txz\n\nSlackware x86_64 13.1 package:\n07ab0f3337fc15656cd2e841c9b0eba4 httpd-2.2.27-x86_64-1_slack13.1.txz\n\nSlackware 13.37 package:\nb5cefd8903745aceaa68b482cb63e4e2 httpd-2.2.27-i486-1_slack13.37.txz\n\nSlackware x86_64 13.37 package:\n610a33703e7f84fd14f09bc9529c1cd5 httpd-2.2.27-x86_64-1_slack13.37.txz\n\nSlackware 14.0 package:\nd6dedc1064a6a4d039b188fed02de89b httpd-2.4.10-i486-1_slack14.0.txz\n\nSlackware x86_64 14.0 package:\n7d150bf3bd558bf70ea2c21a08a1b5b7 httpd-2.4.10-x86_64-1_slack14.0.txz\n\nSlackware 14.1 package:\n7e9b03930b0452a95595a61cf1b093d8 httpd-2.4.10-i486-1_slack14.1.txz\n\nSlackware x86_64 14.1 package:\nefc9893a3428d87a8d78787fbde793e0 httpd-2.4.10-x86_64-1_slack14.1.txz\n\nSlackware -current package:\n1ac5a4cc6275c8f7cfa6e3a77a27f2db n/httpd-2.4.10-i486-1.txz\n\nSlackware x86_64 -current package:\n7fa5fda601a324238f5a2768204a7476 n/httpd-2.4.10-x86_64-1.txz\n\n\nInstallation instructions:\n+------------------------+\n\nUpgrade the package as root:\n# upgradepkg httpd-2.4.10-i486-1_slack14.1.txz\n\nThen, restart Apache httpd:\n\n# /etc/rc.d/rc.httpd stop\n# /etc/rc.d/rc.httpd start\n\n\n+-----+\n\nSlackware Linux Security Team\nhttp://slackware.com/gpg-key\nsecurity@slackware.com\n\n+------------------------------------------------------------------------+\n| To leave the slackware-security mailing list: |\n+------------------------------------------------------------------------+\n| Send an email to majordomo@slackware.com with this text in the body of |\n| the email message: |\n| |\n| unsubscribe slackware-security |\n| |\n| You will get a confirmation message back containing instructions to |\n| complete the process. Please do not reply to this email address. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nAPPLE-SA-2015-04-08-2 OS X 10.10.3 and Security Update 2015-004\n\nOS X Yosemite 10.10.3 and Security Update 2015-004 are now available\nand address the following:\n\nAdmin Framework\nAvailable for: OS X Yosemite v10.10 to v10.10.2\nImpact: A process may gain admin privileges without properly\nauthenticating\nDescription: An issue existed when checking XPC entitlements. This\nissue was addressed with improved entitlement checking. \nCVE-ID\nCVE-2015-1130 : Emil Kvarnhammar at TrueSec\n\napache\nAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 to v10.10.2\nImpact: Multiple vulnerabilities in Apache\nDescription: Multiple vulnerabilities existed in Apache versions\nprior to 2.4.10 and 2.2.29, including one that may allow a remote\nattacker to execute arbitrary code. These issues were addressed by\nupdating Apache to versions 2.4.10 and 2.2.29\nCVE-ID\nCVE-2013-0118\nCVE-2013-5704\nCVE-2013-6438\nCVE-2014-0098\nCVE-2014-0117\nCVE-2014-0118\nCVE-2014-0226\nCVE-2014-0231\nCVE-2014-3523\n\nATS\nAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 to v10.10.2\nImpact: A local user may be able to execute arbitrary code with\nsystem privileges\nDescription: Multiple input validation issues existed in fontd. \nThese issues were addressed through improved input validation. \nCVE-ID\nCVE-2015-1131 : Ian Beer of Google Project Zero\nCVE-2015-1132 : Ian Beer of Google Project Zero\nCVE-2015-1133 : Ian Beer of Google Project Zero\nCVE-2015-1134 : Ian Beer of Google Project Zero\nCVE-2015-1135 : Ian Beer of Google Project Zero\n\nCertificate Trust Policy\nImpact: Update to the certificate trust policy\nDescription: The certificate trust policy was updated. The complete\nlist of certificates may be viewed at https://support.apple.com/en-\nus/HT202858. \n\nCFNetwork HTTPProtocol\nAvailable for: OS X Yosemite v10.10 to v10.10.2\nImpact: Cookies belonging to one origin may be sent to another\norigin\nDescription: A cross-domain cookie issue existed in redirect\nhandling. Cookies set in a redirect response could be passed on to a\nredirect target belonging to another origin. The issue was address\nthrough improved handling of redirects. \nCVE-ID\nCVE-2015-1089 : Niklas Keller\n\nCFNetwork Session\nAvailable for: OS X Yosemite v10.10 to v10.10.2\nImpact: Authentication credentials may be sent to a server on\nanother origin\nDescription: A cross-domain HTTP request headers issue existed in\nredirect handling. The issue was addressed through\nimproved handling of redirects. \nCVE-ID\nCVE-2015-1091 : Diego Torres (http://dtorres.me)\n\nCFURL\nAvailable for: OS X Yosemite v10.10 to v10.10.2\nImpact: Visiting a maliciously crafted website may lead to arbitrary\ncode execution\nDescription: An input validation issue existed within URL\nprocessing. This issue was addressed through improved URL validation. \nCVE-ID\nCVE-2015-1088 : Luigi Galli\n\nCoreAnimation\nAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 to v10.10.2\nImpact: Visiting a maliciously crafted website may lead to arbitrary\ncode execution\nDescription: A use-after-free issue existed in CoreAnimation. This\nissue was addressed through improved mutex management. \nCVE-ID\nCVE-2015-1136 : Apple\n\nFontParser\nAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 to v10.10.2\nImpact: Processing a maliciously crafted font file may lead to\narbitrary code execution\nDescription: Multiple memory corruption issues existed in the\nprocessing of font files. These issues were addressed through\nimproved bounds checking. \nCVE-ID\nCVE-2015-1093 : Marc Schoenefeld\n\nGraphics Driver\nAvailable for: OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 to v10.10.2\nImpact: A local user may be able to execute arbitrary code with\nsystem privileges\nDescription: A NULL pointer dereference existed in NVIDIA graphics\ndriver\u0027s handling of certain IOService userclient types. This issue\nwas addressed through additional context validation. \nCVE-ID\nCVE-2015-1137 :\nFrank Graziano and John Villamil of the Yahoo Pentest Team\n\nHypervisor\nAvailable for: OS X Yosemite v10.10 to v10.10.2\nImpact: A local application may be able to cause a denial of service\nDescription: An input validation issue existed in the hypervisor\nframework. This issue was addressed through improved input\nvalidation. \nCVE-ID\nCVE-2015-1138 : Izik Eidus and Alex Fishman\n\nImageIO\nAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 to v10.10.2\nImpact: Processing a maliciously crafted .sgi file may lead to\narbitrary code execution\nDescription: A memory corruption issue existed in the handling of\n.sgi files. This issue was addressed through improved bounds\nchecking. \nCVE-ID\nCVE-2015-1139 : Apple\n\nIOHIDFamily\nAvailable for: OS X Yosemite v10.10 to v10.10.2\nImpact: A malicious HID device may be able to cause arbitrary code\nexecution\nDescription: A memory corruption issue existed in an IOHIDFamily\nAPI. This issue was addressed through improved memory handling. \nCVE-ID\nCVE-2015-1095 : Andrew Church\n\nIOHIDFamily\nAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 to v10.10.2\nImpact: A local user may be able to execute arbitrary code with\nsystem privileges\nDescription: A buffer overflow issue existed in IOHIDFamily. This\nissue was addressed through improved memory handling. \nCVE-ID\nCVE-2015-1140 : lokihardt@ASRT working with HP\u0027s Zero Day Initiative,\nLuca Todesco\n\nIOHIDFamily\nAvailable for: OS X Yosemite v10.10 to v10.10.2\nImpact: A local user may be able to determine kernel memory layout\nDescription: An issue existed in IOHIDFamily that led to the\ndisclosure of kernel memory content. This issue was addressed through\nimproved bounds checking. \nCVE-ID\nCVE-2015-1096 : Ilja van Sprundel of IOActive\n\nIOHIDFamily\nAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5\nImpact: A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription: A heap buffer overflow existed in IOHIDFamily\u0027s\nhandling of key-mapping properties. This issue was addressed through\nimproved bounds checking. \nCVE-ID\nCVE-2014-4404 : Ian Beer of Google Project Zero\n\nIOHIDFamily\nAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5\nImpact: A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription: A null pointer dereference existed in IOHIDFamily\u0027s\nhandling of key-mapping properties. This issue was addressed through\nimproved validation of IOHIDFamily key-mapping properties. \nCVE-ID\nCVE-2014-4405 : Ian Beer of Google Project Zero\n\nIOHIDFamily\nAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5\nImpact: A user may be able to execute arbitrary code with system\nprivileges\nDescription: An out-of-bounds write issue exited in the IOHIDFamily\ndriver. The issue was addressed through improved input validation. \nCVE-ID\nCVE-2014-4380 : cunzhang from Adlab of Venustech\n\nKernel\nAvailable for: OS X Yosemite v10.10 to v10.10.2\nImpact: A local user may be able to cause unexpected system shutdown\nDescription: An issue existed in the handling of virtual memory\noperations within the kernel. The issue is fixed through improved\nhandling of the mach_vm_read operation. \nCVE-ID\nCVE-2015-1141 : Ole Andre Vadla Ravnas of www.frida.re\n\nKernel\nAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 to v10.10.2\nImpact: A local user may be able to cause a system denial of service\nDescription: A race condition existed in the kernel\u0027s setreuid\nsystem call. This issue was addressed through improved state\nmanagement. \nCVE-ID\nCVE-2015-1099 : Mark Mentovai of Google Inc. \n\nKernel\nAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 to v10.10.2\nImpact: A local application may escalate privileges using a\ncompromised service intended to run with reduced privileges\nDescription: setreuid and setregid system calls failed to drop\nprivileges permanently. This issue was addressed by correctly\ndropping privileges. \nCVE-ID\nCVE-2015-1117 : Mark Mentovai of Google Inc. \n\nKernel\nAvailable for: OS X Yosemite v10.10 to v10.10.2\nImpact: An attacker with a privileged network position may be able\nto redirect user traffic to arbitrary hosts\nDescription: ICMP redirects were enabled by default on OS X. This\nissue was addressed by disabling ICMP redirects. \nCVE-ID\nCVE-2015-1103 : Zimperium Mobile Security Labs\n\nKernel\nAvailable for: OS X Yosemite v10.10 to v10.10.2\nImpact: An attacker with a privileged network position may be able\nto cause a denial of service\nDescription: A state inconsistency existed in the processing of TCP\nheaders. This issue was addressed through improved state handling. \nCVE-ID\nCVE-2015-1102 : Andrey Khudyakov and Maxim Zhuravlev of Kaspersky Lab\n\nKernel\nAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 to v10.10.2\nImpact: A local user may be able to cause unexpected system\ntermination or read kernel memory\nDescription: A out of bounds memory access issue existed in the\nkernel. This issue was addressed through improved memory handling. \nCVE-ID\nCVE-2015-1100 : Maxime Villard of m00nbsd\n\nKernel\nAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 to v10.10.2\nImpact: A remote attacker may be able to bypass network filters\nDescription: The system would treat some IPv6 packets from remote\nnetwork interfaces as local packets. The issue was addressed by\nrejecting these packets. \nCVE-ID\nCVE-2015-1104 : Stephen Roettger of the Google Security Team\n\nKernel\nAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 to v10.10.2\nImpact: A local user may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue existed in the kernel. This\nissue was addressed through improved memory handling. \nCVE-ID\nCVE-2015-1101 : lokihardt@ASRT working with HP\u0027s Zero Day Initiative\n\nKernel\nAvailable for: OS X Yosemite v10.10 to v10.10.2\nImpact: A remote attacker may be able to cause a denial of service\nDescription: A state inconsistency issue existed in the handling of\nTCP out of band data. This issue was addressed through improved state\nmanagement. \nCVE-ID\nCVE-2015-1105 : Kenton Varda of Sandstorm.io\n\nLaunchServices\nAvailable for: OS X Yosemite v10.10 to v10.10.2\nImpact: A local user may be able to cause the Finder to crash\nDescription: An input validation issue existed in LaunchServices\u0027s\nhandling of application localization data. This issue was addressed\nthrough improved validation of localization data. \nCVE-ID\nCVE-2015-1142\n\nLaunchServices\nAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 to v10.10.2\nImpact: A local user may be able to execute arbitrary code with\nsystem privileges\nDescription: A type confusion issue existed in LaunchServices\u0027s\nhandling of localized strings. This issue was addressed through\nadditional bounds checking. \nCVE-ID\nCVE-2015-1143 : Apple\n\nlibnetcore\nAvailable for: OS X Yosemite v10.10 to v10.10.2\nImpact: Processing a maliciously crafted configuration profile may\nlead to unexpected application termination\nDescription: A memory corruption issue existed in the handling of\nconfiguration profiles. This issue was addressed through improved\nbounds checking. \nCVE-ID\nCVE-2015-1118 : Zhaofeng Chen, Hui Xue, Yulong Zhang, and Tao Wei of\nFireEye, Inc. \n\nntp\nAvailable for: OS X Yosemite v10.10 to v10.10.2\nImpact: A remote attacker may brute force ntpd authentication keys\nDescription: The config_auth function in ntpd generated a weak key\nwhen an authentication key was not configured. This issue was\naddressed by improved key generation. \nCVE-ID\nCVE-2014-9298\n\nOpenLDAP\nAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 to v10.10.2\nImpact: A remote unauthenticated client may be able to cause a\ndenial of service\nDescription: Multiple input validation issues existed in OpenLDAP. \nThese issues were addressed by improved input validation. \nCVE-ID\nCVE-2015-1545 : Ryan Tandy\nCVE-2015-1546 : Ryan Tandy\n\nOpenSSL\nAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 to v10.10.2\nImpact: Multiple vulnerabilities in OpenSSL\nDescription: Multiple vulnerabilities existed in OpenSSL 0.9.8zc,\nincluding one that may allow an attacker to intercept connections to\na server that supports export-grade ciphers. These issues were\naddressed by updating OpenSSL to version 0.9.8zd. \nCVE-ID\nCVE-2014-3569\nCVE-2014-3570\nCVE-2014-3571\nCVE-2014-3572\nCVE-2014-8275\nCVE-2015-0204\n\nOpen Directory Client\nAvailable for: OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 to v10.10.2\nImpact: A password might be sent unencrypted over the network when\nusing Open Directory from OS X Server\nDescription: If an Open Directory client was bound to an OS X Server\nbut did not install the certificates of the OS X Server, and then a\nuser on that client changed their password, the password change\nrequest was sent over the network without encryption. This issue was\naddressed by having the client require encryption for this case. \nCVE-ID\nCVE-2015-1147 : Apple\n\nPHP\nAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 to v10.10.2\nImpact: Multiple vulnerabilities in PHP\nDescription: Multiple vulnerabilities existed in PHP versions prior\nto 5.3.29, 5.4.38, and 5.5.20, including one which may have led to\narbitrary code execution. This update addresses the issues by\nupdating PHP to versions 5.3.29, 5.4.38, and 5.5.20. \nCVE-ID\nCVE-2013-6712\nCVE-2014-0207\nCVE-2014-0237\nCVE-2014-0238\nCVE-2014-2497\nCVE-2014-3478\nCVE-2014-3479\nCVE-2014-3480\nCVE-2014-3487\nCVE-2014-3538\nCVE-2014-3587\nCVE-2014-3597\nCVE-2014-3668\nCVE-2014-3669\nCVE-2014-3670\nCVE-2014-3710\nCVE-2014-3981\nCVE-2014-4049\nCVE-2014-4670\nCVE-2014-4698\nCVE-2014-5120\n\nQuickLook\nAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 to v10.10.2\nImpact: Opening a maliciously crafted iWork file may lead to\narbitrary code execution\nDescription: A memory corruption issue existed in the handling of\niWork files. This issue was addressed through improved memory\nhandling. \nCVE-ID\nCVE-2015-1098 : Christopher Hickstein\n\nSceneKit\nAvailable for: OS X Mountain Lion v10.8.5\nImpact: Viewing a maliciously crafted Collada file may lead to\narbitrary code execution\nDescription: A heap buffer overflow existed in SceneKit\u0027s handling\nof Collada files. Viewing a maliciously crafted Collada file may have\nled to arbitrary code execution. This issue was addressed through\nimproved validation of accessor elements. \nCVE-ID\nCVE-2014-8830 : Jose Duart of Google Security Team\n\nScreen Sharing\nAvailable for: OS X Yosemite v10.10 to v10.10.2\nImpact: A user\u0027s password may be logged to a local file\nDescription: In some circumstances, Screen Sharing may log a user\u0027s\npassword that is not readable by other users on the system. This\nissue was addressed by removing logging of credential. \nCVE-ID\nCVE-2015-1148 : Apple\n\nSecurity - Code Signing\nAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 to v10.10.2\nImpact: Tampered applications may not be prevented from launching\nDescription: Applications containing specially crafted bundles may\nhave been able to launch without a completely valid signature. This\nissue was addressed by adding additional checks. \nCVE-ID\nCVE-2015-1145\nCVE-2015-1146\n\nUniformTypeIdentifiers\nAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 to v10.10.2\nImpact: A local user may be able to execute arbitrary code with\nsystem privileges\nDescription: A buffer overflow existed in the way Uniform Type\nIdentifiers were handled. This issue was addressed with improved\nbounds checking. \nCVE-ID\nCVE-2015-1144 : Apple\n\nWebKit\nAvailable for: OS X Yosemite v10.10 to v10.10.2\nImpact: Visiting a maliciously crafted website may lead to arbitrary\ncode execution\nDescription: A memory corruption issue existed in WebKit. This\nissues was addressed through improved memory handling. \nCVE-ID\nCVE-2015-1069 : lokihardt@ASRT working with HP\u0027s Zero Day Initiative\n\nSecurity Update 2015-004 (available for OS X Mountain Lion v10.8.5\nand OS X Mavericks v10.9.5) also addresses an issue caused by the fix\nfor CVE-2015-1067 in Security Update 2015-002. This issue prevented\nRemote Apple Events clients on any version from connecting to the\nRemote Apple Events server. In default configurations, Remote Apple\nEvents is not enabled. \n\nOS X Yosemite 10.10.3 includes the security content of Safari 8.0.5. \nhttps://support.apple.com/en-us/HT204658\n\nOS X Yosemite 10.10.3 and Security Update 2015-004 may be obtained\nfrom the Mac App Store or Apple\u0027s Software Downloads web site:\nhttp://www.apple.com/support/downloads/\n\nInformation will also be posted to the Apple Security Updates\nweb site: http://support.apple.com/kb/HT1222\n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n\n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG/MacGPG2 v2.0.22 (Darwin)\nComment: GPGTools - http://gpgtools.org\n\niQIcBAEBAgAGBQJVJKj2AAoJEBcWfLTuOo7tDh4QAK0LxfwMRKcdOXOKpXsRz6lg\nlhZ+CLVcSepq8qBkFQ74f3B5CuhxD0IGQPaAuSXl51tWYdfN+92tkbmyZ9k8901l\n+I0vw6upeE+oqRnGtSRzq68UhcARbdV8V1+C0Xl3IIuuHc+xlEgvklDhF9Pc8XM6\nDudGiVNqt6MOqd5Oc4s4FFF0nnpnyG9+UJem3mi4Ee88PwI4x1Hev7utPPmaPDzj\ncjkVeislko3QArNJxtBpkYudErA4eR5OX8Tdf12jAmPTtjrXUb3VigEf78Nna0RW\nkHTOGdB5EZ+YFZ8KlyIQlENBjTtI8CGdCF4/S/2xDN83NTRsimd5Y7LSjdd0uANo\npqxAc3Gzn5xngWF1Qbb6V+XZBfz5NoeTq5BXBB5OHz4PSGaQuMsBA2RYFMzNLqWv\nD/T5U1JtzRLALt0lYAz63B0OhW7KXeLI9oer1Vo4wWF9O9cUFyuSI4JU5uYLQpJX\nkEpSFt4YPFFxMnlzCLzLkmVGax4w9M/tRHYeSKAnRlnsoPBtIGFItlNZE2RduD/R\n5n2APoJa3banQ8miycGORYP3WsktDRZzBy+2QPWuz8sE3AvAkO9xWp8PrQBkqf/b\n6CIG5UkCYITG2uzBXqnGbfDiEDvBLNN1Yq0ZZI23iYRxrdW0I0pv1CHio354q12G\nvVE37tYUU4PnLfwlcazq\n=MOsT\n-----END PGP SIGNATURE-----\n. \n \n mod_lua.c in the mod_lua module in the Apache HTTP Server through\n 2.4.10 does not support an httpd configuration in which the same\n Lua authorization provider is used with different arguments within\n different contexts, which allows remote attackers to bypass intended\n access restrictions in opportunistic circumstances by leveraging\n multiple Require directives, as demonstrated by a configuration that\n specifies authorization for one group to access a certain directory,\n and authorization for a second group to access a second directory\n (CVE-2014-8109). A malicious client could\n use Trailer headers to set additional HTTP headers after header\n processing was performed by other modules. This could, for example,\n lead to a bypass of header restrictions defined with mod_headers\n (CVE-2013-5704). A newly introduced\n configuration directive MergeTrailers can be used to re-enable the\n old method of processing Trailer headers, which also re-introduces\n the aforementioned flaw. \n \n This update also fixes the following bug:\n \n Prior to this update, the mod_proxy_wstunnel module failed to set\n up an SSL connection when configured to use a back end server using\n the wss: URL scheme, causing proxied connections to fail. In these\n updated packages, SSL is used when proxying to wss: back end servers\n (rhbz#1141950). The verification\n of md5 checksums and GPG signatures is performed automatically for you. 7) - noarch, x86_64\n\n3. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Important: httpd security update\nAdvisory ID: RHSA-2014:0921-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2014-0921.html\nIssue date: 2014-07-23\nCVE Names: CVE-2013-4352 CVE-2014-0117 CVE-2014-0118 \n CVE-2014-0226 CVE-2014-0231 \n=====================================================================\n\n1. Summary:\n\nUpdated httpd packages that fix multiple security issues are now available\nfor Red Hat Enterprise Linux 7. \n\nThe Red Hat Security Response Team has rated this update as having\nImportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client Optional (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux Server (v. 7) - noarch, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - ppc64, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - x86_64\n\n3. \n\nA race condition flaw, leading to heap-based buffer overflows, was found in\nthe mod_status httpd module. A remote attacker able to access a status page\nserved by mod_status on a server using a threaded Multi-Processing Module\n(MPM) could send a specially crafted request that would cause the httpd\nchild process to crash or, possibly, allow the attacker to execute\narbitrary code with the privileges of the \"apache\" user. (CVE-2014-0226)\n\nA NULL pointer dereference flaw was found in the mod_cache httpd module. \n(CVE-2013-4352)\n\nA denial of service flaw was found in the mod_proxy httpd module. (CVE-2014-0117)\n\nA denial of service flaw was found in the way httpd\u0027s mod_deflate module\nhandled request body decompression (configured via the \"DEFLATE\" input\nfilter). A remote attacker able to send a request whose body would be\ndecompressed could use this flaw to consume an excessive amount of system\nmemory and CPU on the target system. (CVE-2014-0118)\n\nA denial of service flaw was found in the way httpd\u0027s mod_cgid module\nexecuted CGI scripts that did not read data from the standard input. \nA remote attacker could submit a specially crafted request that would cause\nthe httpd child process to hang indefinitely. (CVE-2014-0231)\n\nAll httpd users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. After installing the\nupdated packages, the httpd daemon will be restarted automatically. \n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1120596 - CVE-2014-0231 httpd: mod_cgid denial of service\n1120599 - CVE-2014-0117 httpd: mod_proxy denial of service\n1120601 - CVE-2014-0118 httpd: mod_deflate denial of service\n1120603 - CVE-2014-0226 httpd: mod_status heap-based buffer overflow\n1120604 - CVE-2013-4352 httpd: mod_cache NULL pointer dereference crash\n\n6. Package List:\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nSource:\nhttpd-2.4.6-18.el7_0.src.rpm\n\nnoarch:\nhttpd-manual-2.4.6-18.el7_0.noarch.rpm\n\nx86_64:\nhttpd-2.4.6-18.el7_0.x86_64.rpm\nhttpd-debuginfo-2.4.6-18.el7_0.x86_64.rpm\nhttpd-devel-2.4.6-18.el7_0.x86_64.rpm\nhttpd-tools-2.4.6-18.el7_0.x86_64.rpm\nmod_ldap-2.4.6-18.el7_0.x86_64.rpm\nmod_proxy_html-2.4.6-18.el7_0.x86_64.rpm\nmod_session-2.4.6-18.el7_0.x86_64.rpm\nmod_ssl-2.4.6-18.el7_0.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nSource:\nhttpd-2.4.6-18.el7_0.src.rpm\n\nnoarch:\nhttpd-manual-2.4.6-18.el7_0.noarch.rpm\n\nx86_64:\nhttpd-2.4.6-18.el7_0.x86_64.rpm\nhttpd-debuginfo-2.4.6-18.el7_0.x86_64.rpm\nhttpd-devel-2.4.6-18.el7_0.x86_64.rpm\nhttpd-tools-2.4.6-18.el7_0.x86_64.rpm\nmod_ldap-2.4.6-18.el7_0.x86_64.rpm\nmod_proxy_html-2.4.6-18.el7_0.x86_64.rpm\nmod_session-2.4.6-18.el7_0.x86_64.rpm\nmod_ssl-2.4.6-18.el7_0.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nhttpd-2.4.6-18.el7_0.src.rpm\n\nnoarch:\nhttpd-manual-2.4.6-18.el7_0.noarch.rpm\n\nppc64:\nhttpd-2.4.6-18.el7_0.ppc64.rpm\nhttpd-debuginfo-2.4.6-18.el7_0.ppc64.rpm\nhttpd-devel-2.4.6-18.el7_0.ppc64.rpm\nhttpd-tools-2.4.6-18.el7_0.ppc64.rpm\nmod_ssl-2.4.6-18.el7_0.ppc64.rpm\n\ns390x:\nhttpd-2.4.6-18.el7_0.s390x.rpm\nhttpd-debuginfo-2.4.6-18.el7_0.s390x.rpm\nhttpd-devel-2.4.6-18.el7_0.s390x.rpm\nhttpd-tools-2.4.6-18.el7_0.s390x.rpm\nmod_ssl-2.4.6-18.el7_0.s390x.rpm\n\nx86_64:\nhttpd-2.4.6-18.el7_0.x86_64.rpm\nhttpd-debuginfo-2.4.6-18.el7_0.x86_64.rpm\nhttpd-devel-2.4.6-18.el7_0.x86_64.rpm\nhttpd-tools-2.4.6-18.el7_0.x86_64.rpm\nmod_ssl-2.4.6-18.el7_0.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nppc64:\nhttpd-debuginfo-2.4.6-18.el7_0.ppc64.rpm\nmod_ldap-2.4.6-18.el7_0.ppc64.rpm\nmod_proxy_html-2.4.6-18.el7_0.ppc64.rpm\nmod_session-2.4.6-18.el7_0.ppc64.rpm\n\ns390x:\nhttpd-debuginfo-2.4.6-18.el7_0.s390x.rpm\nmod_ldap-2.4.6-18.el7_0.s390x.rpm\nmod_proxy_html-2.4.6-18.el7_0.s390x.rpm\nmod_session-2.4.6-18.el7_0.s390x.rpm\n\nx86_64:\nhttpd-debuginfo-2.4.6-18.el7_0.x86_64.rpm\nmod_ldap-2.4.6-18.el7_0.x86_64.rpm\nmod_proxy_html-2.4.6-18.el7_0.x86_64.rpm\nmod_session-2.4.6-18.el7_0.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nhttpd-2.4.6-18.el7_0.src.rpm\n\nnoarch:\nhttpd-manual-2.4.6-18.el7_0.noarch.rpm\n\nx86_64:\nhttpd-2.4.6-18.el7_0.x86_64.rpm\nhttpd-debuginfo-2.4.6-18.el7_0.x86_64.rpm\nhttpd-devel-2.4.6-18.el7_0.x86_64.rpm\nhttpd-tools-2.4.6-18.el7_0.x86_64.rpm\nmod_ssl-2.4.6-18.el7_0.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nx86_64:\nhttpd-debuginfo-2.4.6-18.el7_0.x86_64.rpm\nmod_ldap-2.4.6-18.el7_0.x86_64.rpm\nmod_proxy_html-2.4.6-18.el7_0.x86_64.rpm\nmod_session-2.4.6-18.el7_0.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/#package\n\n7. References:\n\nhttps://www.redhat.com/security/data/cve/CVE-2013-4352.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-0117.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-0118.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-0226.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-0231.html\nhttps://access.redhat.com/security/updates/classification/#important\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2014 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.4 (GNU/Linux)\n\niD8DBQFTz4k8XlSAg2UNWIIRAhYKAJ9g2VrkFgyFz55UEfv0x8fGXSyjwACghfJ7\nzOzeWbMF1aXEVExM5K4QNMA=\n=qBwW\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. ============================================================================\nUbuntu Security Notice USN-2299-1\nJuly 23, 2014\n\napache2 vulnerabilities\n============================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 14.04 LTS\n- Ubuntu 12.04 LTS\n- Ubuntu 10.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in Apache HTTP Server. This issue only\naffected Ubuntu 14.04 LTS. \n(CVE-2014-0118)\n\nMarek Kroemeke and others discovered that the mod_status module incorrectly\nhandled certain requests. (CVE-2014-0226)\n\nRainer Jung discovered that the mod_cgid module incorrectly handled certain\nscripts. (CVE-2014-0231)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 14.04 LTS:\n apache2-bin 2.4.7-1ubuntu4.1\n\nUbuntu 12.04 LTS:\n apache2.2-bin 2.2.22-1ubuntu1.7\n\nUbuntu 10.04 LTS:\n apache2.2-bin 2.2.14-5ubuntu8.14\n\nIn general, a standard system update will make all the necessary changes", "sources": [ { "db": "NVD", "id": "CVE-2014-0117" }, { "db": "JVNDB", "id": "JVNDB-2014-003472" }, { "db": "ZDI", "id": "ZDI-14-239" }, { "db": "BID", "id": "68740" }, { "db": "VULHUB", "id": "VHN-67610" }, { "db": "PACKETSTORM", "id": "127598" }, { "db": "PACKETSTORM", "id": "131359" }, { "db": "PACKETSTORM", "id": "131098" }, { "db": "PACKETSTORM", "id": "127586" }, { "db": "PACKETSTORM", "id": "127588" }, { "db": "PACKETSTORM", "id": "127585" } ], "trust": 3.15 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-0117", "trust": 4.1 }, { "db": "ZDI", "id": "ZDI-14-239", "trust": 2.7 }, { "db": "JVN", "id": "JVNVU91828320", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2014-003472", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-2241", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-201407-491", "trust": 0.7 }, { "db": "BID", "id": "68740", "trust": 0.4 }, { "db": "PACKETSTORM", "id": "127585", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "127598", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "127563", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-67610", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "131359", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "131098", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "127586", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "127588", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-14-239" }, { "db": "VULHUB", "id": "VHN-67610" }, { "db": "BID", "id": "68740" }, { "db": "JVNDB", "id": "JVNDB-2014-003472" }, { "db": "PACKETSTORM", "id": "127598" }, { "db": "PACKETSTORM", "id": "131359" }, { "db": "PACKETSTORM", "id": "131098" }, { "db": "PACKETSTORM", "id": "127586" }, { "db": "PACKETSTORM", "id": "127588" }, { "db": "PACKETSTORM", "id": "127585" }, { "db": "NVD", "id": "CVE-2014-0117" }, { "db": "CNNVD", "id": "CNNVD-201407-491" } ] }, "id": "VAR-201407-0515", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-67610" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T10:47:41.910000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Fixed in Apache httpd 2.4.10", "trust": 0.8, "url": "http://httpd.apache.org/security/vulnerabilities_24.html#2.4.10" }, { "title": "Diff of /httpd/httpd/trunk/modules/proxy/proxy_util.c", "trust": 0.8, "url": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/proxy_util.c?r1=1609680\u0026r2=1610674\u0026diff_format=h" }, { "title": "Diff of /httpd/httpd/trunk/modules/proxy/mod_proxy_http.c", "trust": 0.8, "url": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c?r1=1599486\u0026r2=1610674\u0026diff_format=h" }, { "title": "Log of /httpd/httpd/trunk/modules/proxy/mod_proxy_http.c", "trust": 0.8, "url": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c" }, { "title": "Log of /httpd/httpd/trunk/modules/proxy/proxy_util.c", "trust": 0.8, "url": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/proxy_util.c" }, { "title": "APPLE-SA-2015-04-08-2 OS X 10.10.3 and Security Update 2015-004", "trust": 0.8, "url": "http://lists.apple.com/archives/security-announce/2015/apr/msg00001.html" }, { "title": "HT204659", "trust": 0.8, "url": "http://support.apple.com/en-us/ht204659" }, { "title": "HT204659", "trust": 0.8, "url": "http://support.apple.com/ja-jp/ht204659" }, { "title": "Oracle Critical Patch Update Advisory - January 2015", "trust": 0.8, "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "title": "Text Form of Oracle Critical Patch Update - January 2015 Risk Matrices", "trust": 0.8, "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015verbose-1972976.html" }, { "title": "Bug 1120599", "trust": 0.8, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1120599" }, { "title": "January 2015 Critical Patch Update Released", "trust": 0.8, "url": "https://blogs.oracle.com/security/entry/january_2015_critical_patch_update" }, { "title": "Multiple Denial Of Service(DoS) vulnerabilities in Apache HTTP Server", "trust": 0.8, "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_denial_of_service_dos5" }, { "title": "Apache has issued an update to correct this vulnerability.", "trust": 0.7, "url": "http://httpd.apache.org/security/vulnerabilities_24.html" }, { "title": "httpd-2.4.10", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=50900" }, { "title": "httpd-2.4.10", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=50901" } ], "sources": [ { "db": "ZDI", "id": "ZDI-14-239" }, { "db": "JVNDB", "id": "JVNDB-2014-003472" }, { "db": "CNNVD", "id": "CNNVD-201407-491" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-67610" }, { "db": "JVNDB", "id": "JVNDB-2014-003472" }, { "db": "NVD", "id": "CVE-2014-0117" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "http://advisories.mageia.org/mgasa-2014-0305.html" }, { "trust": 2.1, "url": "http://httpd.apache.org/security/vulnerabilities_24.html" }, { "trust": 2.0, "url": "http://seclists.org/fulldisclosure/2014/jul/117" }, { "trust": 1.7, "url": "http://lists.apple.com/archives/security-announce/2015/apr/msg00001.html" }, { "trust": 1.7, "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "trust": 1.7, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1120599" }, { "trust": 1.7, "url": "https://support.apple.com/ht204659" }, { "trust": 1.7, "url": "http://zerodayinitiative.com/advisories/zdi-14-239/" }, { "trust": 1.1, "url": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c" }, { "trust": 1.1, "url": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/proxy_util.c" }, { "trust": 1.0, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0117" }, { "trust": 1.0, "url": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c?r1=1599486\u0026r2=1610674\u0026diff_format=h" }, { "trust": 1.0, "url": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/proxy_util.c?r1=1609680\u0026r2=1610674\u0026diff_format=h" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3ccvs.httpd.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3ccvs.httpd.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3ccvs.httpd.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3ccvs.httpd.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3ccvs.httpd.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3ccvs.httpd.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3ccvs.httpd.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3ccvs.httpd.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3ccvs.httpd.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3ccvs.httpd.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3ccvs.httpd.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3ccvs.httpd.apache.org%3e" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu91828320/index.html" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-0117" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0118" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0117" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0231" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0226" }, { "trust": 0.6, "url": "httpd.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3ccvs." }, { "trust": 0.6, "url": "httpd.apache.org/security/vulnerabilities_24.html" }, { "trust": 0.6, "url": "http://" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3ccvs." }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3ccvs." }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3ccvs." }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3ccvs." }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3ccvs." }, { "trust": 0.6, "url": "http.c?r1=1599486\u0026r2=1610674\u0026diff_format=h" }, { "trust": 0.6, "url": "httpd/trunk/modules/proxy/mod_proxy_" }, { "trust": 0.6, "url": "http://svn.apache.org/viewvc/" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3ccvs." }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3ccvs." }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3ccvs." }, { "trust": 0.6, "url": "httpd/trunk/modules/proxy/proxy_util.c" }, { "trust": 0.6, "url": "httpd/trunk/modules/proxy/proxy_util.c?r1=1609680\u0026r2=1610674\u0026diff_format=h" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3ccvs." }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3ccvs." }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3ccvs." }, { "trust": 0.3, "url": "http://httpd.apache.org/" }, { "trust": 0.3, "url": "http://www.zerodayinitiative.com/advisories/zdi-14-239/" }, { "trust": 0.2, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0231" }, { "trust": 0.2, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0118" }, { "trust": 0.2, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0226" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-6438" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0098" }, { "trust": 0.2, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.2, "url": "https://www.redhat.com/security/data/cve/cve-2014-0117.html" }, { "trust": 0.2, "url": "https://www.redhat.com/security/data/cve/cve-2013-4352.html" }, { "trust": 0.2, "url": "https://access.redhat.com/security/team/key/#package" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-4352" }, { "trust": 0.2, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.2, "url": "https://www.redhat.com/security/data/cve/cve-2014-0118.html" }, { "trust": 0.2, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.2, "url": "https://www.redhat.com/security/data/cve/cve-2014-0226.html" }, { "trust": 0.2, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.2, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.2, "url": "https://www.redhat.com/security/data/cve/cve-2014-0231.html" }, { "trust": 0.1, "url": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c?r1=1599486\u0026amp;r2=1610674\u0026amp;diff_format=h" }, { "trust": 0.1, "url": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/proxy_util.c?r1=1609680\u0026amp;r2=1610674\u0026amp;diff_format=h" }, { "trust": 0.1, "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3ccvs.httpd.apache.org%3e" }, { "trust": 0.1, "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3ccvs.httpd.apache.org%3e" }, { "trust": 0.1, "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3ccvs.httpd.apache.org%3e" }, { "trust": 0.1, "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3ccvs.httpd.apache.org%3e" }, { "trust": 0.1, "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3ccvs.httpd.apache.org%3e" }, { "trust": 0.1, "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3ccvs.httpd.apache.org%3e" }, { "trust": 0.1, "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3ccvs.httpd.apache.org%3e" }, { "trust": 0.1, "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3ccvs.httpd.apache.org%3e" }, { "trust": 0.1, "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3ccvs.httpd.apache.org%3e" }, { "trust": 0.1, "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3ccvs.httpd.apache.org%3e" }, { "trust": 0.1, "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3ccvs.httpd.apache.org%3e" }, { "trust": 0.1, "url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3ccvs.httpd.apache.org%3e" }, { "trust": 0.1, "url": "http://slackware.com" }, { "trust": 0.1, "url": "http://osuosl.org)" }, { "trust": 0.1, "url": "http://slackware.com/gpg-key" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0118" }, { "trust": 0.1, "url": "https://www.frida.re" }, { "trust": 0.1, "url": "https://support.apple.com/en-us/ht204658" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3487" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3571" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3597" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3670" }, { "trust": 0.1, "url": "http://support.apple.com/kb/ht1222" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0238" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3572" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-2497" }, { "trust": 0.1, "url": "http://www.apple.com/support/downloads/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3523" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3587" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0237" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3669" }, { "trust": 0.1, "url": "https://support.apple.com/en-" }, { "trust": 0.1, "url": "https://www.apple.com/support/security/pgp/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3538" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3480" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3668" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0207" }, { "trust": 0.1, "url": "http://gpgtools.org" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-5704" }, { "trust": 0.1, "url": "http://dtorres.me)" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3479" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3570" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3478" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3569" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-6712" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-8109" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-5704" }, { "trust": 0.1, "url": "http://advisories.mageia.org/mgasa-2014-0527.html" }, { "trust": 0.1, "url": "http://www.mandriva.com/en/support/security/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3581" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0228" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-5704" }, { "trust": 0.1, "url": "http://advisories.mageia.org/mgasa-2014-0135.html" }, { "trust": 0.1, "url": "http://www.mandriva.com/en/support/security/advisories/" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-8109" }, { "trust": 0.1, "url": "http://advisories.mageia.org/mgasa-2015-0011.html" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-6438" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0098" }, { "trust": 0.1, "url": "http://advisories.mageia.org/mgasa-2015-0099.html" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3581" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0228" }, { "trust": 0.1, "url": "https://rhn.redhat.com/errata/rhsa-2014-0922.html" }, { "trust": 0.1, "url": "https://rhn.redhat.com/errata/rhsa-2014-0921.html" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/apache2/2.2.14-5ubuntu8.14" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/apache2/2.4.7-1ubuntu4.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/apache2/2.2.22-1ubuntu1.7" }, { "trust": 0.1, "url": "http://www.ubuntu.com/usn/usn-2299-1" } ], "sources": [ { "db": "ZDI", "id": "ZDI-14-239" }, { "db": "VULHUB", "id": "VHN-67610" }, { "db": "BID", "id": "68740" }, { "db": "JVNDB", "id": "JVNDB-2014-003472" }, { "db": "PACKETSTORM", "id": "127598" }, { "db": "PACKETSTORM", "id": "131359" }, { "db": "PACKETSTORM", "id": "131098" }, { "db": "PACKETSTORM", "id": "127586" }, { "db": "PACKETSTORM", "id": "127588" }, { "db": "PACKETSTORM", "id": "127585" }, { "db": "NVD", "id": "CVE-2014-0117" }, { "db": "CNNVD", "id": "CNNVD-201407-491" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZDI", "id": "ZDI-14-239" }, { "db": "VULHUB", "id": "VHN-67610" }, { "db": "BID", "id": "68740" }, { "db": "JVNDB", "id": "JVNDB-2014-003472" }, { "db": "PACKETSTORM", "id": "127598" }, { "db": "PACKETSTORM", "id": "131359" }, { "db": "PACKETSTORM", "id": "131098" }, { "db": "PACKETSTORM", "id": "127586" }, { "db": "PACKETSTORM", "id": "127588" }, { "db": "PACKETSTORM", "id": "127585" }, { "db": "NVD", "id": "CVE-2014-0117" }, { "db": "CNNVD", "id": "CNNVD-201407-491" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-07-18T00:00:00", "db": "ZDI", "id": "ZDI-14-239" }, { "date": "2014-07-20T00:00:00", "db": "VULHUB", "id": "VHN-67610" }, { "date": "2014-07-15T00:00:00", "db": "BID", "id": "68740" }, { "date": "2014-07-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-003472" }, { "date": "2014-07-24T23:46:22", "db": "PACKETSTORM", "id": "127598" }, { "date": "2015-04-09T16:30:50", "db": "PACKETSTORM", "id": "131359" }, { "date": "2015-03-30T21:25:14", "db": "PACKETSTORM", "id": "131098" }, { "date": "2014-07-23T20:48:47", "db": "PACKETSTORM", "id": "127586" }, { "date": "2014-07-23T20:49:08", "db": "PACKETSTORM", "id": "127588" }, { "date": "2014-07-23T20:48:33", "db": "PACKETSTORM", "id": "127585" }, { "date": "2014-07-20T11:12:48.823000", "db": "NVD", "id": "CVE-2014-0117" }, { "date": "2014-07-22T00:00:00", "db": "CNNVD", "id": "CNNVD-201407-491" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-07-18T00:00:00", "db": "ZDI", "id": "ZDI-14-239" }, { "date": "2019-08-15T00:00:00", "db": "VULHUB", "id": "VHN-67610" }, { "date": "2015-05-07T17:32:00", "db": "BID", "id": "68740" }, { "date": "2015-05-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-003472" }, { "date": "2023-11-07T02:18:09.703000", "db": "NVD", "id": "CVE-2014-0117" }, { "date": "2021-06-07T00:00:00", "db": "CNNVD", "id": "CNNVD-201407-491" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "127586" }, { "db": "PACKETSTORM", "id": "127588" }, { "db": "PACKETSTORM", "id": "127585" }, { "db": "CNNVD", "id": "CNNVD-201407-491" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apache HTTP Server of mod_proxy Service disruption in modules (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-003472" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201407-491" } ], "trust": 0.6 } }
ghsa-8qwx-34pp-wp2m
Vulnerability from github
The mod_proxy module in the Apache HTTP Server 2.4.x before 2.4.10, when a reverse proxy is enabled, allows remote attackers to cause a denial of service (child-process crash) via a crafted HTTP Connection header.
{ "affected": [], "aliases": [ "CVE-2014-0117" ], "database_specific": { "cwe_ids": [ "CWE-20" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2014-07-20T11:12:00Z", "severity": "MODERATE" }, "details": "The mod_proxy module in the Apache HTTP Server 2.4.x before 2.4.10, when a reverse proxy is enabled, allows remote attackers to cause a denial of service (child-process crash) via a crafted HTTP Connection header.", "id": "GHSA-8qwx-34pp-wp2m", "modified": "2022-05-13T01:09:48Z", "published": "2022-05-13T01:09:48Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0117" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1120599" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://support.apple.com/HT204659" }, { "type": "WEB", "url": "http://advisories.mageia.org/MGASA-2014-0305.html" }, { "type": "WEB", "url": "http://httpd.apache.org/security/vulnerabilities_24.html" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2014/Jul/117" }, { "type": "WEB", "url": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c" }, { "type": "WEB", "url": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c?r1=1599486\u0026r2=1610674\u0026diff_format=h" }, { "type": "WEB", "url": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/proxy_util.c" }, { "type": "WEB", "url": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/proxy_util.c?r1=1609680\u0026r2=1610674\u0026diff_format=h" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "type": "WEB", "url": "http://zerodayinitiative.com/advisories/ZDI-14-239" } ], "schema_version": "1.4.0", "severity": [] }
rhsa-2014_0922
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated httpd24-httpd packages that fix multiple security issues are now\navailable for Red Hat Software Collections 1.\n\nThe Red Hat Security Response Team has rated this update as having\nImportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient,\nand extensible web server.\n\nA race condition flaw, leading to heap-based buffer overflows, was found in\nthe mod_status httpd module. A remote attacker able to access a status page\nserved by mod_status on a server using a threaded Multi-Processing Module\n(MPM) could send a specially crafted request that would cause the httpd\nchild process to crash or, possibly, allow the attacker to execute\narbitrary code with the privileges of the \"apache\" user. (CVE-2014-0226)\n\nA NULL pointer dereference flaw was found in the mod_cache httpd module.\nA malicious HTTP server could cause the httpd child process to crash when\nthe Apache HTTP Server was used as a forward proxy with caching.\n(CVE-2013-4352)\n\nA denial of service flaw was found in the mod_proxy httpd module. A remote\nattacker could send a specially crafted request to a server configured as a\nreverse proxy using a threaded Multi-Processing Modules (MPM) that would\ncause the httpd child process to crash. (CVE-2014-0117)\n\nA denial of service flaw was found in the way httpd\u0027s mod_deflate module\nhandled request body decompression (configured via the \"DEFLATE\" input\nfilter). A remote attacker able to send a request whose body would be\ndecompressed could use this flaw to consume an excessive amount of system\nmemory and CPU on the target system. (CVE-2014-0118)\n\nA denial of service flaw was found in the way httpd\u0027s mod_cgid module\nexecuted CGI scripts that did not read data from the standard input.\nA remote attacker could submit a specially crafted request that would cause\nthe httpd child process to hang indefinitely. (CVE-2014-0231)\n\nAll httpd24-httpd users are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. After installing\nthe updated packages, the httpd daemon will be restarted automatically.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:0922", "url": "https://access.redhat.com/errata/RHSA-2014:0922" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1120596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1120596" }, { "category": "external", "summary": "1120599", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1120599" }, { "category": "external", "summary": "1120601", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1120601" }, { "category": "external", "summary": "1120603", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1120603" }, { "category": "external", "summary": "1120604", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1120604" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_0922.json" } ], "title": "Red Hat Security Advisory: httpd24-httpd security update", "tracking": { "current_release_date": "2024-11-05T18:31:33+00:00", "generator": { "date": "2024-11-05T18:31:33+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2014:0922", "initial_release_date": "2014-07-23T10:00:08+00:00", "revision_history": [ { "date": "2014-07-23T10:00:08+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-07-23T10:00:09+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T18:31:33+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Software Collections 1 for Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Software Collections 1 for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-1.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:1::el6" } } }, { "category": "product_name", "name": "Red Hat Software Collections 1 for Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Software Collections 1 for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-1.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:1::el6" } } }, { "category": "product_name", "name": "Red Hat Software Collections 1 for Red Hat Enterprise Linux Server EUS (v. 6.4)", "product": { "name": "Red Hat Software Collections 1 for Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-RHSCL-1.1-6.4.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:1::el6" } } }, { "category": "product_name", "name": "Red Hat Software Collections 1 for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections 1 for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-1.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:1::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections 1 for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Software Collections 1 for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-1.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:1::el7" } } } ], "category": "product_family", "name": "Red Hat Software Collections" }, { "branches": [ { "category": "product_version", "name": "httpd24-httpd-0:2.4.6-18.el6.x86_64", "product": { "name": "httpd24-httpd-0:2.4.6-18.el6.x86_64", "product_id": "httpd24-httpd-0:2.4.6-18.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.6-18.el6?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-mod_ssl-1:2.4.6-18.el6.x86_64", "product": { "name": "httpd24-mod_ssl-1:2.4.6-18.el6.x86_64", "product_id": "httpd24-mod_ssl-1:2.4.6-18.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_ssl@2.4.6-18.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd24-httpd-devel-0:2.4.6-18.el6.x86_64", "product": { "name": "httpd24-httpd-devel-0:2.4.6-18.el6.x86_64", "product_id": "httpd24-httpd-devel-0:2.4.6-18.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-devel@2.4.6-18.el6?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-httpd-tools-0:2.4.6-18.el6.x86_64", "product": { "name": "httpd24-httpd-tools-0:2.4.6-18.el6.x86_64", "product_id": "httpd24-httpd-tools-0:2.4.6-18.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-tools@2.4.6-18.el6?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-mod_ldap-0:2.4.6-18.el6.x86_64", "product": { "name": "httpd24-mod_ldap-0:2.4.6-18.el6.x86_64", "product_id": "httpd24-mod_ldap-0:2.4.6-18.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_ldap@2.4.6-18.el6?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-mod_session-0:2.4.6-18.el6.x86_64", "product": { "name": "httpd24-mod_session-0:2.4.6-18.el6.x86_64", "product_id": "httpd24-mod_session-0:2.4.6-18.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_session@2.4.6-18.el6?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64", "product": { "name": "httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64", "product_id": "httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.6-18.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64", "product": { "name": "httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64", "product_id": "httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.6-18.el6?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-httpd-debuginfo-0:2.4.6-21.el7.x86_64", "product": { "name": "httpd24-httpd-debuginfo-0:2.4.6-21.el7.x86_64", "product_id": "httpd24-httpd-debuginfo-0:2.4.6-21.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.6-21.el7?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-mod_proxy_html-1:2.4.6-21.el7.x86_64", "product": { "name": "httpd24-mod_proxy_html-1:2.4.6-21.el7.x86_64", "product_id": "httpd24-mod_proxy_html-1:2.4.6-21.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.6-21.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd24-httpd-devel-0:2.4.6-21.el7.x86_64", "product": { "name": "httpd24-httpd-devel-0:2.4.6-21.el7.x86_64", "product_id": "httpd24-httpd-devel-0:2.4.6-21.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-devel@2.4.6-21.el7?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-mod_ssl-1:2.4.6-21.el7.x86_64", "product": { "name": "httpd24-mod_ssl-1:2.4.6-21.el7.x86_64", "product_id": "httpd24-mod_ssl-1:2.4.6-21.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_ssl@2.4.6-21.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd24-httpd-0:2.4.6-21.el7.x86_64", "product": { "name": "httpd24-httpd-0:2.4.6-21.el7.x86_64", "product_id": "httpd24-httpd-0:2.4.6-21.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.6-21.el7?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-httpd-tools-0:2.4.6-21.el7.x86_64", "product": { "name": "httpd24-httpd-tools-0:2.4.6-21.el7.x86_64", "product_id": "httpd24-httpd-tools-0:2.4.6-21.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-tools@2.4.6-21.el7?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-mod_session-0:2.4.6-21.el7.x86_64", "product": { "name": "httpd24-mod_session-0:2.4.6-21.el7.x86_64", "product_id": "httpd24-mod_session-0:2.4.6-21.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_session@2.4.6-21.el7?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-mod_ldap-0:2.4.6-21.el7.x86_64", "product": { "name": "httpd24-mod_ldap-0:2.4.6-21.el7.x86_64", "product_id": "httpd24-mod_ldap-0:2.4.6-21.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_ldap@2.4.6-21.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd24-httpd-0:2.4.6-18.el6.src", "product": { "name": "httpd24-httpd-0:2.4.6-18.el6.src", "product_id": "httpd24-httpd-0:2.4.6-18.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.6-18.el6?arch=src" } } }, { "category": "product_version", "name": "httpd24-httpd-0:2.4.6-21.el7.src", "product": { "name": "httpd24-httpd-0:2.4.6-21.el7.src", "product_id": "httpd24-httpd-0:2.4.6-21.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.6-21.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd24-httpd-manual-0:2.4.6-18.el6.noarch", "product": { "name": "httpd24-httpd-manual-0:2.4.6-18.el6.noarch", "product_id": "httpd24-httpd-manual-0:2.4.6-18.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-manual@2.4.6-18.el6?arch=noarch" } } }, { "category": "product_version", "name": "httpd24-httpd-manual-0:2.4.6-21.el7.noarch", "product": { "name": "httpd24-httpd-manual-0:2.4.6-21.el7.noarch", "product_id": "httpd24-httpd-manual-0:2.4.6-21.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-manual@2.4.6-21.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.6-18.el6.src as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-0:2.4.6-18.el6.src" }, "product_reference": "httpd24-httpd-0:2.4.6-18.el6.src", "relates_to_product_reference": "6Server-RHSCL-1.1-6.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.6-18.el6.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-0:2.4.6-18.el6.x86_64" }, "product_reference": "httpd24-httpd-0:2.4.6-18.el6.x86_64", "relates_to_product_reference": "6Server-RHSCL-1.1-6.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64", "relates_to_product_reference": "6Server-RHSCL-1.1-6.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.6-18.el6.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-devel-0:2.4.6-18.el6.x86_64" }, "product_reference": "httpd24-httpd-devel-0:2.4.6-18.el6.x86_64", "relates_to_product_reference": "6Server-RHSCL-1.1-6.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-manual-0:2.4.6-18.el6.noarch as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-manual-0:2.4.6-18.el6.noarch" }, "product_reference": "httpd24-httpd-manual-0:2.4.6-18.el6.noarch", "relates_to_product_reference": "6Server-RHSCL-1.1-6.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.6-18.el6.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-tools-0:2.4.6-18.el6.x86_64" }, "product_reference": "httpd24-httpd-tools-0:2.4.6-18.el6.x86_64", "relates_to_product_reference": "6Server-RHSCL-1.1-6.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.6-18.el6.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_ldap-0:2.4.6-18.el6.x86_64" }, "product_reference": "httpd24-mod_ldap-0:2.4.6-18.el6.x86_64", "relates_to_product_reference": "6Server-RHSCL-1.1-6.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64", "relates_to_product_reference": "6Server-RHSCL-1.1-6.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.6-18.el6.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_session-0:2.4.6-18.el6.x86_64" }, "product_reference": "httpd24-mod_session-0:2.4.6-18.el6.x86_64", "relates_to_product_reference": "6Server-RHSCL-1.1-6.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.6-18.el6.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_ssl-1:2.4.6-18.el6.x86_64" }, "product_reference": "httpd24-mod_ssl-1:2.4.6-18.el6.x86_64", "relates_to_product_reference": "6Server-RHSCL-1.1-6.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.6-18.el6.src as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.src" }, "product_reference": "httpd24-httpd-0:2.4.6-18.el6.src", "relates_to_product_reference": "6Server-RHSCL-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.6-18.el6.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.x86_64" }, "product_reference": "httpd24-httpd-0:2.4.6-18.el6.x86_64", "relates_to_product_reference": "6Server-RHSCL-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64", "relates_to_product_reference": "6Server-RHSCL-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.6-18.el6.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-18.el6.x86_64" }, "product_reference": "httpd24-httpd-devel-0:2.4.6-18.el6.x86_64", "relates_to_product_reference": "6Server-RHSCL-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-manual-0:2.4.6-18.el6.noarch as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-18.el6.noarch" }, "product_reference": "httpd24-httpd-manual-0:2.4.6-18.el6.noarch", "relates_to_product_reference": "6Server-RHSCL-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.6-18.el6.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-18.el6.x86_64" }, "product_reference": "httpd24-httpd-tools-0:2.4.6-18.el6.x86_64", "relates_to_product_reference": "6Server-RHSCL-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.6-18.el6.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-18.el6.x86_64" }, "product_reference": "httpd24-mod_ldap-0:2.4.6-18.el6.x86_64", "relates_to_product_reference": "6Server-RHSCL-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64", "relates_to_product_reference": "6Server-RHSCL-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.6-18.el6.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-1.1:httpd24-mod_session-0:2.4.6-18.el6.x86_64" }, "product_reference": "httpd24-mod_session-0:2.4.6-18.el6.x86_64", "relates_to_product_reference": "6Server-RHSCL-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.6-18.el6.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-18.el6.x86_64" }, "product_reference": "httpd24-mod_ssl-1:2.4.6-18.el6.x86_64", "relates_to_product_reference": "6Server-RHSCL-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.6-18.el6.src as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.src" }, "product_reference": "httpd24-httpd-0:2.4.6-18.el6.src", "relates_to_product_reference": "6Workstation-RHSCL-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.6-18.el6.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.x86_64" }, "product_reference": "httpd24-httpd-0:2.4.6-18.el6.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.6-18.el6.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-18.el6.x86_64" }, "product_reference": "httpd24-httpd-devel-0:2.4.6-18.el6.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-manual-0:2.4.6-18.el6.noarch as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-18.el6.noarch" }, "product_reference": "httpd24-httpd-manual-0:2.4.6-18.el6.noarch", "relates_to_product_reference": "6Workstation-RHSCL-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.6-18.el6.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-18.el6.x86_64" }, "product_reference": "httpd24-httpd-tools-0:2.4.6-18.el6.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.6-18.el6.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-18.el6.x86_64" }, "product_reference": "httpd24-mod_ldap-0:2.4.6-18.el6.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.6-18.el6.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-1.1:httpd24-mod_session-0:2.4.6-18.el6.x86_64" }, "product_reference": "httpd24-mod_session-0:2.4.6-18.el6.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.6-18.el6.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-18.el6.x86_64" }, "product_reference": "httpd24-mod_ssl-1:2.4.6-18.el6.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.6-21.el7.src as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.src" }, "product_reference": "httpd24-httpd-0:2.4.6-21.el7.src", "relates_to_product_reference": "7Server-RHSCL-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.6-21.el7.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.x86_64" }, "product_reference": "httpd24-httpd-0:2.4.6-21.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.6-21.el7.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-21.el7.x86_64" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.6-21.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.6-21.el7.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-21.el7.x86_64" }, "product_reference": "httpd24-httpd-devel-0:2.4.6-21.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-manual-0:2.4.6-21.el7.noarch as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-21.el7.noarch" }, "product_reference": "httpd24-httpd-manual-0:2.4.6-21.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.6-21.el7.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-21.el7.x86_64" }, "product_reference": "httpd24-httpd-tools-0:2.4.6-21.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.6-21.el7.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-21.el7.x86_64" }, "product_reference": "httpd24-mod_ldap-0:2.4.6-21.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.6-21.el7.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-21.el7.x86_64" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.6-21.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.6-21.el7.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-1.1:httpd24-mod_session-0:2.4.6-21.el7.x86_64" }, "product_reference": "httpd24-mod_session-0:2.4.6-21.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.6-21.el7.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-21.el7.x86_64" }, "product_reference": "httpd24-mod_ssl-1:2.4.6-21.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.6-21.el7.src as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.src" }, "product_reference": "httpd24-httpd-0:2.4.6-21.el7.src", "relates_to_product_reference": "7Workstation-RHSCL-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.6-21.el7.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.x86_64" }, "product_reference": "httpd24-httpd-0:2.4.6-21.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.6-21.el7.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-21.el7.x86_64" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.6-21.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.6-21.el7.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-21.el7.x86_64" }, "product_reference": "httpd24-httpd-devel-0:2.4.6-21.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-manual-0:2.4.6-21.el7.noarch as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-21.el7.noarch" }, "product_reference": "httpd24-httpd-manual-0:2.4.6-21.el7.noarch", "relates_to_product_reference": "7Workstation-RHSCL-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.6-21.el7.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-21.el7.x86_64" }, "product_reference": "httpd24-httpd-tools-0:2.4.6-21.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.6-21.el7.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-21.el7.x86_64" }, "product_reference": "httpd24-mod_ldap-0:2.4.6-21.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.6-21.el7.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-21.el7.x86_64" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.6-21.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.6-21.el7.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-1.1:httpd24-mod_session-0:2.4.6-21.el7.x86_64" }, "product_reference": "httpd24-mod_session-0:2.4.6-21.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.6-21.el7.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-21.el7.x86_64" }, "product_reference": "httpd24-mod_ssl-1:2.4.6-21.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-1.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-4352", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2014-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1120604" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in the mod_cache httpd module. A malicious HTTP server could cause the httpd child process to crash when the Apache HTTP Server was used as a forward proxy with caching.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_cache NULL pointer dereference crash", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of httpd as shipped with Red Hat Enterprise Linux 5 and 6 as only httpd version 2.4.6 included the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-0:2.4.6-18.el6.src", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-devel-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-manual-0:2.4.6-18.el6.noarch", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-tools-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_ldap-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_session-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_ssl-1:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.src", "6Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-18.el6.noarch", "6Server-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_session-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.src", "6Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-18.el6.noarch", "6Workstation-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_session-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-18.el6.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.src", "7Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-21.el7.noarch", "7Server-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_session-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.src", "7Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-21.el7.noarch", "7Workstation-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_session-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-21.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-4352" }, { "category": "external", "summary": "RHBZ#1120604", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1120604" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-4352", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4352" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4352", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4352" }, { "category": "external", "summary": "http://httpd.apache.org/security/vulnerabilities_24.html", "url": "http://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2014-07-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-07-23T10:00:08+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-0:2.4.6-18.el6.src", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-devel-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-manual-0:2.4.6-18.el6.noarch", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-tools-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_ldap-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_session-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_ssl-1:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.src", "6Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-18.el6.noarch", "6Server-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_session-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.src", "6Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-18.el6.noarch", "6Workstation-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_session-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-18.el6.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.src", "7Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-21.el7.noarch", "7Server-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_session-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.src", "7Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-21.el7.noarch", "7Workstation-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_session-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-21.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0922" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-0:2.4.6-18.el6.src", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-devel-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-manual-0:2.4.6-18.el6.noarch", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-tools-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_ldap-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_session-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_ssl-1:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.src", "6Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-18.el6.noarch", "6Server-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_session-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.src", "6Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-18.el6.noarch", "6Workstation-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_session-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-18.el6.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.src", "7Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-21.el7.noarch", "7Server-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_session-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.src", "7Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-21.el7.noarch", "7Workstation-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_session-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-21.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_cache NULL pointer dereference crash" }, { "cve": "CVE-2014-0117", "discovery_date": "2014-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1120599" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in the mod_proxy httpd module. A remote attacker could send a specially crafted request to a server configured as a reverse proxy using a threaded Multi-Processing Modules (MPM) that would cause the httpd child process to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_proxy denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of httpd as shipped with Red Hat Enterprise Linux 5 and 6, Red Hat JBoss Web Server, and Red Hat JBoss Enterprise Application Platform. These products include httpd 2.2, and only httpd versions 2.4.6 through 2.4.9 include the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-0:2.4.6-18.el6.src", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-devel-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-manual-0:2.4.6-18.el6.noarch", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-tools-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_ldap-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_session-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_ssl-1:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.src", "6Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-18.el6.noarch", "6Server-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_session-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.src", "6Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-18.el6.noarch", "6Workstation-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_session-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-18.el6.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.src", "7Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-21.el7.noarch", "7Server-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_session-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.src", "7Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-21.el7.noarch", "7Workstation-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_session-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-21.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-0117" }, { "category": "external", "summary": "RHBZ#1120599", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1120599" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-0117", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0117" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0117", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0117" }, { "category": "external", "summary": "http://httpd.apache.org/security/vulnerabilities_24.html", "url": "http://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2014-07-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-07-23T10:00:08+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-0:2.4.6-18.el6.src", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-devel-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-manual-0:2.4.6-18.el6.noarch", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-tools-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_ldap-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_session-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_ssl-1:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.src", "6Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-18.el6.noarch", "6Server-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_session-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.src", "6Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-18.el6.noarch", "6Workstation-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_session-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-18.el6.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.src", "7Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-21.el7.noarch", "7Server-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_session-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.src", "7Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-21.el7.noarch", "7Workstation-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_session-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-21.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0922" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-0:2.4.6-18.el6.src", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-devel-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-manual-0:2.4.6-18.el6.noarch", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-tools-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_ldap-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_session-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_ssl-1:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.src", "6Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-18.el6.noarch", "6Server-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_session-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.src", "6Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-18.el6.noarch", "6Workstation-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_session-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-18.el6.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.src", "7Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-21.el7.noarch", "7Server-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_session-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.src", "7Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-21.el7.noarch", "7Workstation-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_session-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-21.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_proxy denial of service" }, { "cve": "CVE-2014-0118", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2014-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1120601" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in the way httpd\u0027s mod_deflate module handled request body decompression (configured via the \"DEFLATE\" input filter). A remote attacker able to send a request whose body would be decompressed could use this flaw to consume an excessive amount of system memory and CPU on the target system.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_deflate denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-0:2.4.6-18.el6.src", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-devel-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-manual-0:2.4.6-18.el6.noarch", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-tools-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_ldap-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_session-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_ssl-1:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.src", "6Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-18.el6.noarch", "6Server-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_session-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.src", "6Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-18.el6.noarch", "6Workstation-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_session-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-18.el6.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.src", "7Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-21.el7.noarch", "7Server-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_session-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.src", "7Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-21.el7.noarch", "7Workstation-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_session-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-21.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-0118" }, { "category": "external", "summary": "RHBZ#1120601", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1120601" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-0118", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0118" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0118", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0118" }, { "category": "external", "summary": "http://httpd.apache.org/security/vulnerabilities_24.html", "url": "http://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2014-07-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-07-23T10:00:08+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-0:2.4.6-18.el6.src", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-devel-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-manual-0:2.4.6-18.el6.noarch", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-tools-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_ldap-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_session-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_ssl-1:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.src", "6Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-18.el6.noarch", "6Server-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_session-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.src", "6Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-18.el6.noarch", "6Workstation-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_session-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-18.el6.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.src", "7Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-21.el7.noarch", "7Server-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_session-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.src", "7Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-21.el7.noarch", "7Workstation-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_session-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-21.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0922" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-0:2.4.6-18.el6.src", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-devel-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-manual-0:2.4.6-18.el6.noarch", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-tools-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_ldap-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_session-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_ssl-1:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.src", "6Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-18.el6.noarch", "6Server-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_session-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.src", "6Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-18.el6.noarch", "6Workstation-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_session-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-18.el6.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.src", "7Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-21.el7.noarch", "7Server-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_session-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.src", "7Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-21.el7.noarch", "7Workstation-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_session-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-21.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_deflate denial of service" }, { "cve": "CVE-2014-0226", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2014-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1120603" } ], "notes": [ { "category": "description", "text": "A race condition flaw, leading to heap-based buffer overflows, was found in the mod_status httpd module. A remote attacker able to access a status page served by mod_status on a server using a threaded Multi-Processing Module (MPM) could send a specially crafted request that would cause the httpd child process to crash or, possibly, allow the attacker to execute arbitrary code with the privileges of the \"apache\" user.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_status heap-based buffer overflow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-0:2.4.6-18.el6.src", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-devel-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-manual-0:2.4.6-18.el6.noarch", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-tools-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_ldap-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_session-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_ssl-1:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.src", "6Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-18.el6.noarch", "6Server-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_session-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.src", "6Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-18.el6.noarch", "6Workstation-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_session-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-18.el6.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.src", "7Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-21.el7.noarch", "7Server-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_session-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.src", "7Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-21.el7.noarch", "7Workstation-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_session-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-21.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-0226" }, { "category": "external", "summary": "RHBZ#1120603", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1120603" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-0226", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0226" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0226", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0226" }, { "category": "external", "summary": "http://httpd.apache.org/security/vulnerabilities_24.html", "url": "http://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2014-07-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-07-23T10:00:08+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-0:2.4.6-18.el6.src", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-devel-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-manual-0:2.4.6-18.el6.noarch", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-tools-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_ldap-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_session-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_ssl-1:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.src", "6Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-18.el6.noarch", "6Server-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_session-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.src", "6Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-18.el6.noarch", "6Workstation-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_session-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-18.el6.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.src", "7Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-21.el7.noarch", "7Server-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_session-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.src", "7Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-21.el7.noarch", "7Workstation-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_session-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-21.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0922" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-0:2.4.6-18.el6.src", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-devel-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-manual-0:2.4.6-18.el6.noarch", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-tools-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_ldap-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_session-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_ssl-1:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.src", "6Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-18.el6.noarch", "6Server-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_session-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.src", "6Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-18.el6.noarch", "6Workstation-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_session-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-18.el6.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.src", "7Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-21.el7.noarch", "7Server-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_session-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.src", "7Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-21.el7.noarch", "7Workstation-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_session-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-21.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: mod_status heap-based buffer overflow" }, { "cve": "CVE-2014-0231", "discovery_date": "2014-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1120596" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in the way httpd\u0027s mod_cgid module executed CGI scripts that did not read data from the standard input. A remote attacker could submit a specially crafted request that would cause the httpd child process to hang indefinitely.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_cgid denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-0:2.4.6-18.el6.src", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-devel-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-manual-0:2.4.6-18.el6.noarch", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-tools-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_ldap-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_session-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_ssl-1:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.src", "6Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-18.el6.noarch", "6Server-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_session-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.src", "6Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-18.el6.noarch", "6Workstation-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_session-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-18.el6.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.src", "7Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-21.el7.noarch", "7Server-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_session-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.src", "7Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-21.el7.noarch", "7Workstation-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_session-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-21.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-0231" }, { "category": "external", "summary": "RHBZ#1120596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1120596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-0231", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0231" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0231", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0231" }, { "category": "external", "summary": "http://httpd.apache.org/security/vulnerabilities_24.html", "url": "http://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2014-07-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-07-23T10:00:08+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-0:2.4.6-18.el6.src", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-devel-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-manual-0:2.4.6-18.el6.noarch", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-tools-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_ldap-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_session-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_ssl-1:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.src", "6Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-18.el6.noarch", "6Server-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_session-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.src", "6Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-18.el6.noarch", "6Workstation-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_session-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-18.el6.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.src", "7Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-21.el7.noarch", "7Server-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_session-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.src", "7Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-21.el7.noarch", "7Workstation-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_session-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-21.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0922" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-0:2.4.6-18.el6.src", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-devel-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-manual-0:2.4.6-18.el6.noarch", "6Server-RHSCL-1.1-6.4.Z:httpd24-httpd-tools-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_ldap-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_session-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1-6.4.Z:httpd24-mod_ssl-1:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.src", "6Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-18.el6.noarch", "6Server-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_session-0:2.4.6-18.el6.x86_64", "6Server-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.src", "6Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-18.el6.noarch", "6Workstation-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_session-0:2.4.6-18.el6.x86_64", "6Workstation-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-18.el6.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.src", "7Server-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-21.el7.noarch", "7Server-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_session-0:2.4.6-21.el7.x86_64", "7Server-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.src", "7Workstation-RHSCL-1.1:httpd24-httpd-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-debuginfo-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-devel-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-httpd-manual-0:2.4.6-21.el7.noarch", "7Workstation-RHSCL-1.1:httpd24-httpd-tools-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_ldap-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_proxy_html-1:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_session-0:2.4.6-21.el7.x86_64", "7Workstation-RHSCL-1.1:httpd24-mod_ssl-1:2.4.6-21.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_cgid denial of service" } ] }
rhsa-2014_0921
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated httpd packages that fix multiple security issues are now available\nfor Red Hat Enterprise Linux 7.\n\nThe Red Hat Security Response Team has rated this update as having\nImportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient,\nand extensible web server.\n\nA race condition flaw, leading to heap-based buffer overflows, was found in\nthe mod_status httpd module. A remote attacker able to access a status page\nserved by mod_status on a server using a threaded Multi-Processing Module\n(MPM) could send a specially crafted request that would cause the httpd\nchild process to crash or, possibly, allow the attacker to execute\narbitrary code with the privileges of the \"apache\" user. (CVE-2014-0226)\n\nA NULL pointer dereference flaw was found in the mod_cache httpd module.\nA malicious HTTP server could cause the httpd child process to crash when\nthe Apache HTTP Server was used as a forward proxy with caching.\n(CVE-2013-4352)\n\nA denial of service flaw was found in the mod_proxy httpd module. A remote\nattacker could send a specially crafted request to a server configured as a\nreverse proxy using a threaded Multi-Processing Modules (MPM) that would\ncause the httpd child process to crash. (CVE-2014-0117)\n\nA denial of service flaw was found in the way httpd\u0027s mod_deflate module\nhandled request body decompression (configured via the \"DEFLATE\" input\nfilter). A remote attacker able to send a request whose body would be\ndecompressed could use this flaw to consume an excessive amount of system\nmemory and CPU on the target system. (CVE-2014-0118)\n\nA denial of service flaw was found in the way httpd\u0027s mod_cgid module\nexecuted CGI scripts that did not read data from the standard input.\nA remote attacker could submit a specially crafted request that would cause\nthe httpd child process to hang indefinitely. (CVE-2014-0231)\n\nAll httpd users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. After installing the\nupdated packages, the httpd daemon will be restarted automatically.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:0921", "url": "https://access.redhat.com/errata/RHSA-2014:0921" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1120596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1120596" }, { "category": "external", "summary": "1120599", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1120599" }, { "category": "external", "summary": "1120601", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1120601" }, { "category": "external", "summary": "1120603", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1120603" }, { "category": "external", "summary": "1120604", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1120604" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_0921.json" } ], "title": "Red Hat Security Advisory: httpd security update", "tracking": { "current_release_date": "2024-11-05T18:31:28+00:00", "generator": { "date": "2024-11-05T18:31:28+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2014:0921", "initial_release_date": "2014-07-23T10:00:19+00:00", "revision_history": [ { "date": "2014-07-23T10:00:19+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-07-23T10:00:19+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T18:31:28+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-18.el7_0.x86_64", "product": { "name": "httpd-0:2.4.6-18.el7_0.x86_64", "product_id": "httpd-0:2.4.6-18.el7_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-18.el7_0?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "product": { "name": "mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "product_id": "mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-18.el7_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-18.el7_0.x86_64", "product": { "name": "mod_ssl-1:2.4.6-18.el7_0.x86_64", "product_id": "mod_ssl-1:2.4.6-18.el7_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-18.el7_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-18.el7_0.x86_64", "product": { "name": "httpd-tools-0:2.4.6-18.el7_0.x86_64", "product_id": "httpd-tools-0:2.4.6-18.el7_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-18.el7_0?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-18.el7_0.x86_64", "product": { "name": "mod_ldap-0:2.4.6-18.el7_0.x86_64", "product_id": "mod_ldap-0:2.4.6-18.el7_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-18.el7_0?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "product_id": "httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-18.el7_0?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-18.el7_0.x86_64", "product": { "name": "httpd-devel-0:2.4.6-18.el7_0.x86_64", "product_id": "httpd-devel-0:2.4.6-18.el7_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-18.el7_0?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-18.el7_0.x86_64", "product": { "name": "mod_session-0:2.4.6-18.el7_0.x86_64", "product_id": "mod_session-0:2.4.6-18.el7_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-18.el7_0?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-18.el7_0.src", "product": { "name": "httpd-0:2.4.6-18.el7_0.src", "product_id": "httpd-0:2.4.6-18.el7_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-18.el7_0?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-manual-0:2.4.6-18.el7_0.noarch", "product": { "name": "httpd-manual-0:2.4.6-18.el7_0.noarch", "product_id": "httpd-manual-0:2.4.6-18.el7_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-18.el7_0?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-18.el7_0.s390x", "product": { "name": "httpd-0:2.4.6-18.el7_0.s390x", "product_id": "httpd-0:2.4.6-18.el7_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-18.el7_0?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-18.el7_0.s390x", "product": { "name": "mod_ssl-1:2.4.6-18.el7_0.s390x", "product_id": "mod_ssl-1:2.4.6-18.el7_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-18.el7_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-18.el7_0.s390x", "product": { "name": "httpd-tools-0:2.4.6-18.el7_0.s390x", "product_id": "httpd-tools-0:2.4.6-18.el7_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-18.el7_0?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "product": { "name": "httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "product_id": "httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-18.el7_0?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-18.el7_0.s390x", "product": { "name": "httpd-devel-0:2.4.6-18.el7_0.s390x", "product_id": "httpd-devel-0:2.4.6-18.el7_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-18.el7_0?arch=s390x" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-18.el7_0.s390x", "product": { "name": "mod_proxy_html-1:2.4.6-18.el7_0.s390x", "product_id": "mod_proxy_html-1:2.4.6-18.el7_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-18.el7_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-18.el7_0.s390x", "product": { "name": "mod_ldap-0:2.4.6-18.el7_0.s390x", "product_id": "mod_ldap-0:2.4.6-18.el7_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-18.el7_0?arch=s390x" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-18.el7_0.s390x", "product": { "name": "mod_session-0:2.4.6-18.el7_0.s390x", "product_id": "mod_session-0:2.4.6-18.el7_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-18.el7_0?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.6-18.el7_0.ppc64", "product": { "name": "httpd-0:2.4.6-18.el7_0.ppc64", "product_id": "httpd-0:2.4.6-18.el7_0.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.6-18.el7_0?arch=ppc64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.6-18.el7_0.ppc64", "product": { "name": "mod_ssl-1:2.4.6-18.el7_0.ppc64", "product_id": "mod_ssl-1:2.4.6-18.el7_0.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-18.el7_0?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.6-18.el7_0.ppc64", "product": { "name": "httpd-tools-0:2.4.6-18.el7_0.ppc64", "product_id": "httpd-tools-0:2.4.6-18.el7_0.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-18.el7_0?arch=ppc64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "product": { "name": "httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "product_id": "httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-18.el7_0?arch=ppc64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.6-18.el7_0.ppc64", "product": { "name": "httpd-devel-0:2.4.6-18.el7_0.ppc64", "product_id": "httpd-devel-0:2.4.6-18.el7_0.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-18.el7_0?arch=ppc64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "product": { "name": "mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "product_id": "mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-18.el7_0?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.6-18.el7_0.ppc64", "product": { "name": "mod_ldap-0:2.4.6-18.el7_0.ppc64", "product_id": "mod_ldap-0:2.4.6-18.el7_0.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-18.el7_0?arch=ppc64" } } }, { "category": "product_version", "name": "mod_session-0:2.4.6-18.el7_0.ppc64", "product": { "name": "mod_session-0:2.4.6-18.el7_0.ppc64", "product_id": "mod_session-0:2.4.6-18.el7_0.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.6-18.el7_0?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-18.el7_0.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64" }, "product_reference": "httpd-0:2.4.6-18.el7_0.ppc64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-18.el7_0.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x" }, "product_reference": "httpd-0:2.4.6-18.el7_0.s390x", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-18.el7_0.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src" }, "product_reference": "httpd-0:2.4.6-18.el7_0.src", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-18.el7_0.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64" }, "product_reference": "httpd-0:2.4.6-18.el7_0.x86_64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-18.el7_0.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64" }, "product_reference": "httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-18.el7_0.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-18.el7_0.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-18.el7_0.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64" }, "product_reference": "httpd-devel-0:2.4.6-18.el7_0.ppc64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-18.el7_0.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x" }, "product_reference": "httpd-devel-0:2.4.6-18.el7_0.s390x", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-18.el7_0.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-18.el7_0.x86_64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-18.el7_0.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch" }, "product_reference": "httpd-manual-0:2.4.6-18.el7_0.noarch", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-18.el7_0.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64" }, "product_reference": "httpd-tools-0:2.4.6-18.el7_0.ppc64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-18.el7_0.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x" }, "product_reference": "httpd-tools-0:2.4.6-18.el7_0.s390x", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-18.el7_0.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-18.el7_0.x86_64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-18.el7_0.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64" }, "product_reference": "mod_ldap-0:2.4.6-18.el7_0.ppc64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-18.el7_0.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x" }, "product_reference": "mod_ldap-0:2.4.6-18.el7_0.s390x", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-18.el7_0.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-18.el7_0.x86_64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-18.el7_0.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64" }, "product_reference": "mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-18.el7_0.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x" }, "product_reference": "mod_proxy_html-1:2.4.6-18.el7_0.s390x", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-18.el7_0.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-18.el7_0.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64" }, "product_reference": "mod_session-0:2.4.6-18.el7_0.ppc64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-18.el7_0.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x" }, "product_reference": "mod_session-0:2.4.6-18.el7_0.s390x", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-18.el7_0.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64" }, "product_reference": "mod_session-0:2.4.6-18.el7_0.x86_64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-18.el7_0.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64" }, "product_reference": "mod_ssl-1:2.4.6-18.el7_0.ppc64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-18.el7_0.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x" }, "product_reference": "mod_ssl-1:2.4.6-18.el7_0.s390x", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-18.el7_0.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-18.el7_0.x86_64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-18.el7_0.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64" }, "product_reference": "httpd-0:2.4.6-18.el7_0.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-18.el7_0.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x" }, "product_reference": "httpd-0:2.4.6-18.el7_0.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-18.el7_0.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src" }, "product_reference": "httpd-0:2.4.6-18.el7_0.src", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-18.el7_0.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64" }, "product_reference": "httpd-0:2.4.6-18.el7_0.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-18.el7_0.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64" }, "product_reference": "httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-18.el7_0.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-18.el7_0.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-18.el7_0.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64" }, "product_reference": "httpd-devel-0:2.4.6-18.el7_0.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-18.el7_0.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x" }, "product_reference": "httpd-devel-0:2.4.6-18.el7_0.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-18.el7_0.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-18.el7_0.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-18.el7_0.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch" }, "product_reference": "httpd-manual-0:2.4.6-18.el7_0.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-18.el7_0.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64" }, "product_reference": "httpd-tools-0:2.4.6-18.el7_0.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-18.el7_0.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x" }, "product_reference": "httpd-tools-0:2.4.6-18.el7_0.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-18.el7_0.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-18.el7_0.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-18.el7_0.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64" }, "product_reference": "mod_ldap-0:2.4.6-18.el7_0.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-18.el7_0.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x" }, "product_reference": "mod_ldap-0:2.4.6-18.el7_0.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-18.el7_0.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-18.el7_0.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-18.el7_0.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64" }, "product_reference": "mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-18.el7_0.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x" }, "product_reference": "mod_proxy_html-1:2.4.6-18.el7_0.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-18.el7_0.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-18.el7_0.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64" }, "product_reference": "mod_session-0:2.4.6-18.el7_0.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-18.el7_0.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x" }, "product_reference": "mod_session-0:2.4.6-18.el7_0.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-18.el7_0.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64" }, "product_reference": "mod_session-0:2.4.6-18.el7_0.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-18.el7_0.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64" }, "product_reference": "mod_ssl-1:2.4.6-18.el7_0.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-18.el7_0.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x" }, "product_reference": "mod_ssl-1:2.4.6-18.el7_0.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-18.el7_0.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-18.el7_0.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-18.el7_0.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64" }, "product_reference": "httpd-0:2.4.6-18.el7_0.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-18.el7_0.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x" }, "product_reference": "httpd-0:2.4.6-18.el7_0.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-18.el7_0.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.src" }, "product_reference": "httpd-0:2.4.6-18.el7_0.src", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-18.el7_0.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64" }, "product_reference": "httpd-0:2.4.6-18.el7_0.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-18.el7_0.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64" }, "product_reference": "httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-18.el7_0.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-18.el7_0.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-18.el7_0.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64" }, "product_reference": "httpd-devel-0:2.4.6-18.el7_0.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-18.el7_0.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x" }, "product_reference": "httpd-devel-0:2.4.6-18.el7_0.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-18.el7_0.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-18.el7_0.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-18.el7_0.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch" }, "product_reference": "httpd-manual-0:2.4.6-18.el7_0.noarch", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-18.el7_0.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64" }, "product_reference": "httpd-tools-0:2.4.6-18.el7_0.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-18.el7_0.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x" }, "product_reference": "httpd-tools-0:2.4.6-18.el7_0.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-18.el7_0.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-18.el7_0.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-18.el7_0.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64" }, "product_reference": "mod_ldap-0:2.4.6-18.el7_0.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-18.el7_0.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x" }, "product_reference": "mod_ldap-0:2.4.6-18.el7_0.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-18.el7_0.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-18.el7_0.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-18.el7_0.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64" }, "product_reference": "mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-18.el7_0.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x" }, "product_reference": "mod_proxy_html-1:2.4.6-18.el7_0.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-18.el7_0.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-18.el7_0.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64" }, "product_reference": "mod_session-0:2.4.6-18.el7_0.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-18.el7_0.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x" }, "product_reference": "mod_session-0:2.4.6-18.el7_0.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-18.el7_0.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64" }, "product_reference": "mod_session-0:2.4.6-18.el7_0.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-18.el7_0.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64" }, "product_reference": "mod_ssl-1:2.4.6-18.el7_0.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-18.el7_0.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x" }, "product_reference": "mod_ssl-1:2.4.6-18.el7_0.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-18.el7_0.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-18.el7_0.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-18.el7_0.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64" }, "product_reference": "httpd-0:2.4.6-18.el7_0.ppc64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-18.el7_0.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x" }, "product_reference": "httpd-0:2.4.6-18.el7_0.s390x", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-18.el7_0.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src" }, "product_reference": "httpd-0:2.4.6-18.el7_0.src", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-18.el7_0.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64" }, "product_reference": "httpd-0:2.4.6-18.el7_0.x86_64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-18.el7_0.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64" }, "product_reference": "httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-18.el7_0.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-18.el7_0.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-18.el7_0.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64" }, "product_reference": "httpd-devel-0:2.4.6-18.el7_0.ppc64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-18.el7_0.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x" }, "product_reference": "httpd-devel-0:2.4.6-18.el7_0.s390x", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-18.el7_0.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-18.el7_0.x86_64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-18.el7_0.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch" }, "product_reference": "httpd-manual-0:2.4.6-18.el7_0.noarch", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-18.el7_0.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64" }, "product_reference": "httpd-tools-0:2.4.6-18.el7_0.ppc64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-18.el7_0.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x" }, "product_reference": "httpd-tools-0:2.4.6-18.el7_0.s390x", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-18.el7_0.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-18.el7_0.x86_64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-18.el7_0.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64" }, "product_reference": "mod_ldap-0:2.4.6-18.el7_0.ppc64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-18.el7_0.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x" }, "product_reference": "mod_ldap-0:2.4.6-18.el7_0.s390x", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-18.el7_0.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-18.el7_0.x86_64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-18.el7_0.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64" }, "product_reference": "mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-18.el7_0.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x" }, "product_reference": "mod_proxy_html-1:2.4.6-18.el7_0.s390x", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-18.el7_0.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-18.el7_0.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64" }, "product_reference": "mod_session-0:2.4.6-18.el7_0.ppc64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-18.el7_0.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x" }, "product_reference": "mod_session-0:2.4.6-18.el7_0.s390x", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-18.el7_0.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64" }, "product_reference": "mod_session-0:2.4.6-18.el7_0.x86_64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-18.el7_0.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64" }, "product_reference": "mod_ssl-1:2.4.6-18.el7_0.ppc64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-18.el7_0.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x" }, "product_reference": "mod_ssl-1:2.4.6-18.el7_0.s390x", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-18.el7_0.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-18.el7_0.x86_64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-18.el7_0.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64" }, "product_reference": "httpd-0:2.4.6-18.el7_0.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-18.el7_0.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x" }, "product_reference": "httpd-0:2.4.6-18.el7_0.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-18.el7_0.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.src" }, "product_reference": "httpd-0:2.4.6-18.el7_0.src", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-18.el7_0.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64" }, "product_reference": "httpd-0:2.4.6-18.el7_0.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-18.el7_0.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64" }, "product_reference": "httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-18.el7_0.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-18.el7_0.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-18.el7_0.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64" }, "product_reference": "httpd-devel-0:2.4.6-18.el7_0.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-18.el7_0.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x" }, "product_reference": "httpd-devel-0:2.4.6-18.el7_0.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-18.el7_0.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-18.el7_0.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-18.el7_0.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch" }, "product_reference": "httpd-manual-0:2.4.6-18.el7_0.noarch", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-18.el7_0.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64" }, "product_reference": "httpd-tools-0:2.4.6-18.el7_0.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-18.el7_0.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x" }, "product_reference": "httpd-tools-0:2.4.6-18.el7_0.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-18.el7_0.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-18.el7_0.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-18.el7_0.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64" }, "product_reference": "mod_ldap-0:2.4.6-18.el7_0.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-18.el7_0.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x" }, "product_reference": "mod_ldap-0:2.4.6-18.el7_0.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-18.el7_0.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-18.el7_0.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-18.el7_0.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64" }, "product_reference": "mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-18.el7_0.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x" }, "product_reference": "mod_proxy_html-1:2.4.6-18.el7_0.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-18.el7_0.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-18.el7_0.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64" }, "product_reference": "mod_session-0:2.4.6-18.el7_0.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-18.el7_0.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x" }, "product_reference": "mod_session-0:2.4.6-18.el7_0.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-18.el7_0.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64" }, "product_reference": "mod_session-0:2.4.6-18.el7_0.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-18.el7_0.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64" }, "product_reference": "mod_ssl-1:2.4.6-18.el7_0.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-18.el7_0.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x" }, "product_reference": "mod_ssl-1:2.4.6-18.el7_0.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-18.el7_0.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-18.el7_0.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-18.el7_0.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64" }, "product_reference": "httpd-0:2.4.6-18.el7_0.ppc64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-18.el7_0.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x" }, "product_reference": "httpd-0:2.4.6-18.el7_0.s390x", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-18.el7_0.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src" }, "product_reference": "httpd-0:2.4.6-18.el7_0.src", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.6-18.el7_0.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64" }, "product_reference": "httpd-0:2.4.6-18.el7_0.x86_64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-18.el7_0.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64" }, "product_reference": "httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-18.el7_0.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.6-18.el7_0.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-18.el7_0.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64" }, "product_reference": "httpd-devel-0:2.4.6-18.el7_0.ppc64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-18.el7_0.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x" }, "product_reference": "httpd-devel-0:2.4.6-18.el7_0.s390x", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.6-18.el7_0.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64" }, "product_reference": "httpd-devel-0:2.4.6-18.el7_0.x86_64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.6-18.el7_0.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch" }, "product_reference": "httpd-manual-0:2.4.6-18.el7_0.noarch", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-18.el7_0.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64" }, "product_reference": "httpd-tools-0:2.4.6-18.el7_0.ppc64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-18.el7_0.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x" }, "product_reference": "httpd-tools-0:2.4.6-18.el7_0.s390x", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.6-18.el7_0.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64" }, "product_reference": "httpd-tools-0:2.4.6-18.el7_0.x86_64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-18.el7_0.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64" }, "product_reference": "mod_ldap-0:2.4.6-18.el7_0.ppc64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-18.el7_0.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x" }, "product_reference": "mod_ldap-0:2.4.6-18.el7_0.s390x", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.6-18.el7_0.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64" }, "product_reference": "mod_ldap-0:2.4.6-18.el7_0.x86_64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-18.el7_0.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64" }, "product_reference": "mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-18.el7_0.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x" }, "product_reference": "mod_proxy_html-1:2.4.6-18.el7_0.s390x", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.6-18.el7_0.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-18.el7_0.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64" }, "product_reference": "mod_session-0:2.4.6-18.el7_0.ppc64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-18.el7_0.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x" }, "product_reference": "mod_session-0:2.4.6-18.el7_0.s390x", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.6-18.el7_0.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64" }, "product_reference": "mod_session-0:2.4.6-18.el7_0.x86_64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-18.el7_0.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64" }, "product_reference": "mod_ssl-1:2.4.6-18.el7_0.ppc64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-18.el7_0.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x" }, "product_reference": "mod_ssl-1:2.4.6-18.el7_0.s390x", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.6-18.el7_0.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64" }, "product_reference": "mod_ssl-1:2.4.6-18.el7_0.x86_64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-4352", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2014-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1120604" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in the mod_cache httpd module. A malicious HTTP server could cause the httpd child process to crash when the Apache HTTP Server was used as a forward proxy with caching.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_cache NULL pointer dereference crash", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of httpd as shipped with Red Hat Enterprise Linux 5 and 6 as only httpd version 2.4.6 included the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Client-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7ComputeNode-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Server-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Server-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Workstation-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Workstation-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-4352" }, { "category": "external", "summary": "RHBZ#1120604", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1120604" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-4352", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4352" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4352", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4352" }, { "category": "external", "summary": "http://httpd.apache.org/security/vulnerabilities_24.html", "url": "http://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2014-07-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-07-23T10:00:19+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Client-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7ComputeNode-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Server-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Server-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Workstation-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Workstation-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0921" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Client-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7ComputeNode-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Server-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Server-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Workstation-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Workstation-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_cache NULL pointer dereference crash" }, { "cve": "CVE-2014-0117", "discovery_date": "2014-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1120599" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in the mod_proxy httpd module. A remote attacker could send a specially crafted request to a server configured as a reverse proxy using a threaded Multi-Processing Modules (MPM) that would cause the httpd child process to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_proxy denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of httpd as shipped with Red Hat Enterprise Linux 5 and 6, Red Hat JBoss Web Server, and Red Hat JBoss Enterprise Application Platform. These products include httpd 2.2, and only httpd versions 2.4.6 through 2.4.9 include the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Client-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7ComputeNode-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Server-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Server-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Workstation-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Workstation-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-0117" }, { "category": "external", "summary": "RHBZ#1120599", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1120599" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-0117", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0117" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0117", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0117" }, { "category": "external", "summary": "http://httpd.apache.org/security/vulnerabilities_24.html", "url": "http://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2014-07-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-07-23T10:00:19+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Client-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7ComputeNode-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Server-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Server-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Workstation-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Workstation-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0921" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Client-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7ComputeNode-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Server-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Server-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Workstation-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Workstation-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_proxy denial of service" }, { "cve": "CVE-2014-0118", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2014-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1120601" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in the way httpd\u0027s mod_deflate module handled request body decompression (configured via the \"DEFLATE\" input filter). A remote attacker able to send a request whose body would be decompressed could use this flaw to consume an excessive amount of system memory and CPU on the target system.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_deflate denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Client-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7ComputeNode-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Server-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Server-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Workstation-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Workstation-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-0118" }, { "category": "external", "summary": "RHBZ#1120601", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1120601" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-0118", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0118" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0118", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0118" }, { "category": "external", "summary": "http://httpd.apache.org/security/vulnerabilities_24.html", "url": "http://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2014-07-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-07-23T10:00:19+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Client-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7ComputeNode-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Server-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Server-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Workstation-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Workstation-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0921" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Client-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7ComputeNode-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Server-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Server-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Workstation-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Workstation-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_deflate denial of service" }, { "cve": "CVE-2014-0226", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2014-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1120603" } ], "notes": [ { "category": "description", "text": "A race condition flaw, leading to heap-based buffer overflows, was found in the mod_status httpd module. A remote attacker able to access a status page served by mod_status on a server using a threaded Multi-Processing Module (MPM) could send a specially crafted request that would cause the httpd child process to crash or, possibly, allow the attacker to execute arbitrary code with the privileges of the \"apache\" user.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_status heap-based buffer overflow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Client-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7ComputeNode-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Server-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Server-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Workstation-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Workstation-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-0226" }, { "category": "external", "summary": "RHBZ#1120603", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1120603" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-0226", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0226" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0226", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0226" }, { "category": "external", "summary": "http://httpd.apache.org/security/vulnerabilities_24.html", "url": "http://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2014-07-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-07-23T10:00:19+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Client-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7ComputeNode-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Server-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Server-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Workstation-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Workstation-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0921" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Client-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7ComputeNode-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Server-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Server-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Workstation-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Workstation-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: mod_status heap-based buffer overflow" }, { "cve": "CVE-2014-0231", "discovery_date": "2014-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1120596" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in the way httpd\u0027s mod_cgid module executed CGI scripts that did not read data from the standard input. A remote attacker could submit a specially crafted request that would cause the httpd child process to hang indefinitely.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_cgid denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Client-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7ComputeNode-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Server-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Server-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Workstation-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Workstation-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-0231" }, { "category": "external", "summary": "RHBZ#1120596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1120596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-0231", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0231" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-0231", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0231" }, { "category": "external", "summary": "http://httpd.apache.org/security/vulnerabilities_24.html", "url": "http://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2014-07-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-07-23T10:00:19+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Client-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7ComputeNode-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Server-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Server-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Workstation-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Workstation-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0921" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Client-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Client-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Client-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Client-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Client-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7ComputeNode-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7ComputeNode-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7ComputeNode-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Server-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Server-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Server-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Server-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Server-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Server-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Server-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Server-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Server-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Server-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Workstation-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Workstation-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Workstation-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Workstation-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Workstation-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.src", "7Workstation-optional-7.0.Z:httpd-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-debuginfo-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-devel-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:httpd-manual-0:2.4.6-18.el7_0.noarch", "7Workstation-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:httpd-tools-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_ldap-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_proxy_html-1:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_session-0:2.4.6-18.el7_0.x86_64", "7Workstation-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.ppc64", "7Workstation-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.s390x", "7Workstation-optional-7.0.Z:mod_ssl-1:2.4.6-18.el7_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_cgid denial of service" } ] }
gsd-2014-0117
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2014-0117", "description": "The mod_proxy module in the Apache HTTP Server 2.4.x before 2.4.10, when a reverse proxy is enabled, allows remote attackers to cause a denial of service (child-process crash) via a crafted HTTP Connection header.", "id": "GSD-2014-0117", "references": [ "https://www.suse.com/security/cve/CVE-2014-0117.html", "https://access.redhat.com/errata/RHSA-2014:0922", "https://access.redhat.com/errata/RHSA-2014:0921", "https://ubuntu.com/security/CVE-2014-0117", "https://advisories.mageia.org/CVE-2014-0117.html", "https://linux.oracle.com/cve/CVE-2014-0117.html", "https://packetstormsecurity.com/files/cve/CVE-2014-0117" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2014-0117" ], "details": "The mod_proxy module in the Apache HTTP Server 2.4.x before 2.4.10, when a reverse proxy is enabled, allows remote attackers to cause a denial of service (child-process crash) via a crafted HTTP Connection header.", "id": "GSD-2014-0117", "modified": "2023-12-13T01:22:44.714912Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-0117", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The mod_proxy module in the Apache HTTP Server 2.4.x before 2.4.10, when a reverse proxy is enabled, allows remote attackers to cause a denial of service (child-process crash) via a crafted HTTP Connection header." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1120599", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1120599" }, { "name": "http://advisories.mageia.org/MGASA-2014-0305.html", "refsource": "CONFIRM", "url": "http://advisories.mageia.org/MGASA-2014-0305.html" }, { "name": "https://support.apple.com/HT204659", "refsource": "CONFIRM", "url": "https://support.apple.com/HT204659" }, { "name": "http://httpd.apache.org/security/vulnerabilities_24.html", "refsource": "CONFIRM", "url": "http://httpd.apache.org/security/vulnerabilities_24.html" }, { "name": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/proxy_util.c?r1=1609680\u0026r2=1610674\u0026diff_format=h", "refsource": "CONFIRM", "url": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/proxy_util.c?r1=1609680\u0026r2=1610674\u0026diff_format=h" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "name": "http://zerodayinitiative.com/advisories/ZDI-14-239/", "refsource": "MISC", "url": "http://zerodayinitiative.com/advisories/ZDI-14-239/" }, { "name": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/proxy_util.c", "refsource": "CONFIRM", "url": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/proxy_util.c" }, { "name": "APPLE-SA-2015-04-08-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html" }, { "name": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c", "refsource": "CONFIRM", "url": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c" }, { "name": "20140722 Apache HTTPd - description of the CVE-2014-0117.", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2014/Jul/117" }, { "name": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c?r1=1599486\u0026r2=1610674\u0026diff_format=h", "refsource": "CONFIRM", "url": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c?r1=1599486\u0026r2=1610674\u0026diff_format=h" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.4.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.4.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.4.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.4.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.10.2", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-0117" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The mod_proxy module in the Apache HTTP Server 2.4.x before 2.4.10, when a reverse proxy is enabled, allows remote attackers to cause a denial of service (child-process crash) via a crafted HTTP Connection header." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/proxy_util.c", "refsource": "CONFIRM", "tags": [], "url": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/proxy_util.c" }, { "name": "http://zerodayinitiative.com/advisories/ZDI-14-239/", "refsource": "MISC", "tags": [], "url": "http://zerodayinitiative.com/advisories/ZDI-14-239/" }, { "name": "http://httpd.apache.org/security/vulnerabilities_24.html", "refsource": "CONFIRM", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://httpd.apache.org/security/vulnerabilities_24.html" }, { "name": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c", "refsource": "CONFIRM", "tags": [], "url": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c" }, { "name": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c?r1=1599486\u0026r2=1610674\u0026diff_format=h", "refsource": "CONFIRM", "tags": [], "url": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c?r1=1599486\u0026r2=1610674\u0026diff_format=h" }, { "name": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/proxy_util.c?r1=1609680\u0026r2=1610674\u0026diff_format=h", "refsource": "CONFIRM", "tags": [], "url": "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/proxy_util.c?r1=1609680\u0026r2=1610674\u0026diff_format=h" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1120599", "refsource": "CONFIRM", "tags": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1120599" }, { "name": "20140722 Apache HTTPd - description of the CVE-2014-0117.", "refsource": "FULLDISC", "tags": [], "url": "http://seclists.org/fulldisclosure/2014/Jul/117" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "name": "http://advisories.mageia.org/MGASA-2014-0305.html", "refsource": "CONFIRM", "tags": [], "url": "http://advisories.mageia.org/MGASA-2014-0305.html" }, { "name": "https://support.apple.com/HT204659", "refsource": "CONFIRM", "tags": [], "url": "https://support.apple.com/HT204659" }, { "name": "APPLE-SA-2015-04-08-2", "refsource": "APPLE", "tags": [], "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2021-06-06T11:15Z", "publishedDate": "2014-07-20T11:12Z" } } }
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.